Re: [OAUTH-WG] OAuth Milestone Update and Rechartering

Chuck Mortimore <cmortimore@salesforce.com> Wed, 14 May 2014 17:45 UTC

Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 739B81A014D for <oauth@ietfa.amsl.com>; Wed, 14 May 2014 10:45:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.978
X-Spam-Level:
X-Spam-Status: No, score=-1.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5IqIlmTxxQ74 for <oauth@ietfa.amsl.com>; Wed, 14 May 2014 10:45:01 -0700 (PDT)
Received: from mail-ob0-f176.google.com (mail-ob0-f176.google.com [209.85.214.176]) by ietfa.amsl.com (Postfix) with ESMTP id 33CF11A012F for <oauth@ietf.org>; Wed, 14 May 2014 10:45:01 -0700 (PDT)
Received: by mail-ob0-f176.google.com with SMTP id wo20so2523567obc.21 for <oauth@ietf.org>; Wed, 14 May 2014 10:44:54 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=zAC777+1NnKiJ7DEVP0Lw8OE24a8eq20pfSJ911aFm4=; b=N1aFTgQRHjxDocWFtSEfCaXwIsggz9s2onvTbxMnlXyQRFg76iGNjn/I04z7qnKEP7 H/kYAeS6FhgOMu3AA4/TIyeqBob8Wrp0XLT6x973IlqBmxjp8Y0cYsN8aiiDAkOSyqAx Chi5bdNO3qM7w+9iFCdnXBNrpekH3qLZzASaSk3CbbCA7lhGooZmn2G138jOvQ608Tj2 tUlYFuNh5U4eZBMJXZ6joT+LTj6Q1w+uk4pve8TWwoYtFsz4DOdSIWLnIIiIz4ry09lD 4OITRZwO13bgJs7BjYUWdJ215E5ssC1p+7NnHx9hNcCjt6dKcQO9OGsg1g3fcetJ9E2G aDoQ==
X-Gm-Message-State: ALoCoQnALglyaESdB6MYjMhpNdt1xofnVR1ntnXEGf4ftCa2PQLsjPjQFjuCaJQVhgxpfWqt5FNu
MIME-Version: 1.0
X-Received: by 10.182.42.228 with SMTP id r4mr5065260obl.20.1400089494203; Wed, 14 May 2014 10:44:54 -0700 (PDT)
Received: by 10.76.75.169 with HTTP; Wed, 14 May 2014 10:44:53 -0700 (PDT)
In-Reply-To: <E604E118-9482-4C18-8485-E946AE7B6640@oracle.com>
References: <536BF140.5070106@gmx.net> <CA+k3eCQN5TGSpQxEbO0n83+8JDVJrTHziVmkjzLUyXtgMQPG1A@mail.gmail.com> <84B60891-F9E1-4183-9031-8BED6315C70F@mit.edu> <-968574624925308911@unknownmsgid> <5373A674.1060700@aol.com> <E604E118-9482-4C18-8485-E946AE7B6640@oracle.com>
Date: Wed, 14 May 2014 10:44:53 -0700
Message-ID: <CA+wnMn9gfjr4UneP2PHeXi+thXX+BwgB0fVa8JRP0ov5vTVJDg@mail.gmail.com>
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Phil Hunt <phil.hunt@oracle.com>
Content-Type: multipart/alternative; boundary="001a11c30b0ef4bb1004f95fbc07"
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/X_NRFQlzRts-O-c_3CnC7c1RkIE
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Milestone Update and Rechartering
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 May 2014 17:45:04 -0000

Would still love to hear you answer _why_ "the IETF needs a draft that
enables and provides user authentication information to clients."

Would still love to see Tony point to the existing a4c implementations.




On Wed, May 14, 2014 at 10:29 AM, Phil Hunt <phil.hunt@oracle.com> wrote:

> This is not an authentication mechanism - it is a method for providing
> end-user authentication information to client applications.  I will publish
> a revised draft shortly.
>
> Phil
>
> @independentid
> www.independentid.com
> phil.hunt@oracle.com
>
>
>
> On May 14, 2014, at 10:23 AM, George Fletcher <gffletch@aol.com> wrote:
>
>  I also would like to see the WG not focus on another authentication
> mechanism and instead look at work like Brian suggested.
>
> Thanks,
> George
>
>  On 5/14/14, 11:41 AM, Chuck Mortimore wrote:
>
> Agree with Brian and Justin here.   Work is already covered in Connect
>
> - cmort
>
> On May 14, 2014, at 8:39 AM, Justin Richer <jricher@mit.edu> wrote:
>
>   I agree with Brian and object to the Authentication work item. I think
> there’s limited interest and utility in such a draft, especially now that
> OpenID Connect has been published and its core authentication capabilities
> are identical to what was called for in the other draft a year ago (a
> similarity, I’ll add, which was noted at the time).
>
>   — Justin
>
>  On May 14, 2014, at 8:24 AM, Brian Campbell <bcampbell@pingidentity.com>
> wrote:
>
>  I would object to 'OAuth Authentication' being picked up by the WG as a
> work item. The starting point draft has expired and it hasn't really been
> discusses since Berlin nearly a year ago.  As I recall, there was only very
> limited interest in it even then. I also don't believe it fits well with
> the WG charter.
>
> I would suggest the WG consider picking up 'OAuth Symmetric Proof of
> Possession for Code Extension' for which there is an excellent starting
> point of http://tools.ietf.org/html/draft-sakimura-oauth-tcse-03 - it's a
> relativity simple security enhancement which addresses problems currently
> being encountered in deployments of native clients.
>
>
>
>
> On Thu, May 8, 2014 at 3:04 PM, Hannes Tschofenig <
> hannes.tschofenig@gmx.net> wrote:
>
>> Hi all,
>>
>> you might have seen that we pushed the assertion documents and the JWT
>> documents to the IESG today. We have also updated the milestones on the
>> OAuth WG page.
>>
>> This means that we can plan to pick up new work in the group.
>> We have sent a request to Kathleen to change the milestone for the OAuth
>> security mechanisms to use the proof-of-possession terminology.
>>
>> We also expect an updated version of the dynamic client registration
>> spec incorporating last call feedback within about 2 weeks.
>>
>> We would like you to think about adding the following milestones to the
>> charter as part of the re-chartering effort:
>>
>> -----
>>
>> Nov 2014 Submit 'Token introspection' to the IESG for consideration as a
>> Proposed Standard
>> Starting point: <draft-richer-oauth-introspection-04>
>>
>> Jan 2015 Submit 'OAuth Authentication' to the IESG for consideration as
>> a Proposed Standard
>> Starting point: <draft-hunt-oauth-v2-user-a4c-01>
>>
>> Jan 2015 Submit 'Token Exchange' to the IESG for consideration as a
>> Proposed Standard
>> Starting point: <draft-jones-oauth-token-exchange-00>
>>
>> -----
>>
>> We also updated the charter text to reflect the current situation. Here
>> is the proposed text:
>>
>> -----
>>
>> Charter for Working Group
>>
>>
>> The Web Authorization (OAuth) protocol allows a user to grant a
>> third-party Web site or application access to the user's protected
>> resources, without necessarily revealing their long-term credentials,
>> or even their identity. For example, a photo-sharing site that
>> supports OAuth could allow its users to use a third-party printing Web
>> site to print their private pictures, without allowing the printing
>> site to gain full control of the user's account and without having the
>> user share his or her photo-sharing sites' long-term credential with
>> the printing site.
>>
>> The OAuth 2.0 protocol suite encompasses
>>
>> * a protocol for obtaining access tokens from an authorization
>> server with the resource owner's consent,
>> * protocols for presenting these access tokens to resource server
>> for access to a protected resource,
>> * guidance for securely using OAuth 2.0,
>> * the ability to revoke access tokens,
>> * standardized format for security tokens encoded in a JSON format
>>   (JSON Web Token, JWT),
>> * ways of using assertions with OAuth, and
>> * a dynamic client registration protocol.
>>
>> The working group also developed security schemes for presenting
>> authorization tokens to access a protected resource. This led to the
>> publication of the bearer token, as well as work that remains to be
>> completed on proof-of-possession and token exchange.
>>
>> The ongoing standardization effort within the OAuth working group will
>> focus on enhancing interoperability and functionality of OAuth
>> deployments, such as a standard for a token introspection service and
>> standards for additional security of OAuth requests.
>>
>> -----
>>
>> Feedback appreciated.
>>
>> Ciao
>> Hannes & Derek
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
> --
>    [image: Ping Identity logo] <https://www.pingidentity.com/>
> Brian Campbell
> Portfolio Architect
>   @ bcampbell@pingidentity.com  [image: phone] +1 720.317.2061  Connect
> with us…  [image: twitter logo] <https://twitter.com/pingidentity> [image:
> youtube logo] <https://www.youtube.com/user/PingIdentityTV> [image:
> LinkedIn logo] <https://www.linkedin.com/company/21870> [image: Facebook
> logo] <https://www.facebook.com/pingidentitypage> [image: Google+ logo]<https://plus.google.com/u/0/114266977739397708540> [image:
> slideshare logo] <http://www.slideshare.net/PingIdentity> [image:
> flipboard logo] <http://flip.it/vjBF7> [image: rss feed icon]<https://www.pingidentity.com/blogs/>
>    [image: Register for Cloud Identity Summit 2014 | Modern Identity
> Revolution | 19–23 July, 2014 | Monterey, CA]<https://www.cloudidentitysummit.com/>
>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>    _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> --
> <XeC.html> <http://connect.me/gffletch>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>