Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2: URI(s)]

Mike Jones <Michael.Jones@microsoft.com> Sat, 09 July 2011 16:25 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6EC121F8800 for <oauth@ietfa.amsl.com>; Sat, 9 Jul 2011 09:25:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bXLfnH2QS8-5 for <oauth@ietfa.amsl.com>; Sat, 9 Jul 2011 09:25:10 -0700 (PDT)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by ietfa.amsl.com (Postfix) with ESMTP id 3B39F21F87FB for <oauth@ietf.org>; Sat, 9 Jul 2011 09:25:10 -0700 (PDT)
Received: from TK5EX14MLTC104.redmond.corp.microsoft.com (157.54.79.159) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Sat, 9 Jul 2011 09:25:09 -0700
Received: from TK5EX14MBXC201.redmond.corp.microsoft.com ([169.254.8.198]) by TK5EX14MLTC104.redmond.corp.microsoft.com ([157.54.79.159]) with mapi id 14.01.0323.002; Sat, 9 Jul 2011 09:25:09 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Brian Campbell <bcampbell@pingidentity.com>, Eran Hammer-Lahav <eran@hueniverse.com>
Thread-Topic: [OAUTH-WG] SAML Assertion Draft Items [Item 2: URI(s)]
Thread-Index: AQHMPjpMB3X2xDS47kisQZzjgM9+XZTkLN8Q
Date: Sat, 09 Jul 2011 16:25:09 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394348D422DF@TK5EX14MBXC201.redmond.corp.microsoft.com>
References: <CA+k3eCTmxRfU9OoQB0yXRRTV9bn+LQph_q96=iA_gtejwSbk-A@mail.gmail.com>
In-Reply-To: <CA+k3eCTmxRfU9OoQB0yXRRTV9bn+LQph_q96=iA_gtejwSbk-A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.54.51.34]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2: URI(s)]
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2011 16:25:11 -0000

If you're going with urn:ietf:wg:oauth:2.0:grant_type:saml:2.0:bearer in the SAML assertion profile, I'll use urn:ietf:wg:oauth:2.0:grant_type:jwt:1.0:bearer in the JWT assertion profile.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Brian Campbell
Sent: Saturday, July 09, 2011 6:15 AM
To: Eran Hammer-Lahav
Cc: oauth
Subject: Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2: URI(s)]

Discussion on the other item, the grant_type URI, inline below.

This whole thing seems like it shouldn't be an issue at all as there's no functionality involved.  But I've been hung up on it for a while and the spec needs some URI. I could *really* use the advice of the AD and/or Chairs on this.  Or anyone with more experience with defining and using URIs/URNs.

Thanks.

On Thu, Jul 7, 2011 at 11:24 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
>
>> Item 2: URI(s)
>> The value for grant_type is currently defined as 
>> http://oauth.net/grant_type/saml/2.0/bearer but there have been some 
>> questions raised about the stability and appropriateness of the URL.
>
> I'm not a fan.
>
>> I really did read RFCs 2648 & 3553, as was suggested at the last F2F 
>> meeting, but it's not clear to me how to register an IETF URI and/or 
>> if those RFCs are fully appropriate for this.  If someone could 
>> explain it to me in terms my preschooler could understand, maybe I 
>> could jump though the proper hoops to get the URI to be something like urn:ietf:something:something.
>
> Asking on the URN list usually helps.

I can try that.

I'm thinking it'd be something like
urn:ietf:wg:oauth:2.0:grant_type:saml:2.0:bearer which is largely based on seeing the use of urn:ietf:wg:oauth:2.0:oob - was there an actual registration done for that?  Or did it just start getting used?
Is doing that okay?

>
>> Otherwise, I can continue to use
>> http://oauth.net/grant_type/saml/2.0/bearer and, assuming the draft 
>> should also cover client authentication, also define 
>> http://oauth.net/client_assertion_type/saml/2.0/bearer.  The JWT 
>> version could then follow a similar pattern.  Or perhaps we could use 
>> the URI, urn:oasis:names:tc:SAML:2.0:cm:bearer which is defined in 
>> section 3.3 of saml-profiles-2.0-os as URI that identifies the bearer 
>> subject confirmation method.  It seems like that might be close 
>> enough to work out without violating anything serious.  And it could 
>> be used for both grant_type and client_assertion_type, which is nice.
>
> Don't use an OASIS URN. That's asking for trouble.

Is it really?  Because it's conceptually inappropriate?  Or because of some supposed (or real) rift between standards bodies?  I mean, this whole draft is about profiling SAML assertions (an OASIS spec) for use with OAuth (soon an IETF spec).  Would using a URN too be so terrible?

You'd previously suggested (or asked why I didn't use) urn:oasis:names:tc:SAML:2.0:assertion which is the XML NS for the OASIS SAML assertion schema.  Would that somehow be different?  That is still an option too, I think.  I hadn't used it because I wanted to differentiate the means of confirming/validating the assertion - as a bearer token - while leavening room for holder of key or other methods in the future.  But using that NS wouldn't necessary preclude it.  I was also looking for an identifier that would enable easy web searching and urn:oasis:names:tc:SAML:2.0:assertion wouldn't really do that.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth