[OAUTH-WG] Consistency in access token parameter

Luke Shepard <lshepard@facebook.com> Tue, 20 April 2010 07:46 UTC

Return-Path: <lshepard@facebook.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 325563A6813 for <oauth@core3.amsl.com>; Tue, 20 Apr 2010 00:46:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.055
X-Spam-Level:
X-Spam-Status: No, score=-3.055 tagged_above=-999 required=5 tests=[AWL=0.210, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eVPDL1kP0Of1 for <oauth@core3.amsl.com>; Tue, 20 Apr 2010 00:46:54 -0700 (PDT)
Received: from mailout-sf2p.facebook.com (mailout-snc1.facebook.com [69.63.179.25]) by core3.amsl.com (Postfix) with ESMTP id AB9923A6B29 for <oauth@ietf.org>; Tue, 20 Apr 2010 00:46:44 -0700 (PDT)
Received: from mail.thefacebook.com ([192.168.18.212]) by pp02.snc1.tfbnw.net (8.14.3/8.14.3) with ESMTP id o3K7juZl016337 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Tue, 20 Apr 2010 00:45:56 -0700
Received: from sc-hub02.TheFacebook.com (192.168.18.105) by sc-hub04.TheFacebook.com (192.168.18.212) with Microsoft SMTP Server (TLS) id 14.0.689.0; Tue, 20 Apr 2010 00:46:30 -0700
Received: from SC-MBXC1.TheFacebook.com ([192.168.18.102]) by sc-hub02.TheFacebook.com ([192.168.18.105]) with mapi; Tue, 20 Apr 2010 00:46:30 -0700
From: Luke Shepard <lshepard@facebook.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Tue, 20 Apr 2010 00:46:25 -0700
Thread-Topic: Consistency in access token parameter
Thread-Index: AcrgSm+6UKont5YdTGazxhgA27Mu7AAEr7ew
Message-ID: <2513A610118CC14C8E622C376C8DEC93D54D66DEAB@SC-MBXC1.TheFacebook.com>
References: <C7F1D1FC.32809%eran@hueniverse.com> <4BCD3B85.3080809@lodderstedt.net>
In-Reply-To: <4BCD3B85.3080809@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-cr-puzzleid: {2BBCFF38-8532-4610-BC8C-3EC2E71DB140}
x-cr-hashedpuzzle: YQI= AfIv Akce B0p7 Czoy C77z DjvK EJrS FUZQ GVlU HEFI H1UT IcF1 JCB+ KUoe K4pe; 1; bwBhAHUAdABoAEAAaQBlAHQAZgAuAG8AcgBnAA==; Sosha1_v1; 7; {2BBCFF38-8532-4610-BC8C-3EC2E71DB140}; bABzAGgAZQBwAGEAcgBkAEAAZgBhAGMAZQBiAG8AbwBrAC4AYwBvAG0A; Tue, 20 Apr 2010 07:46:25 GMT; QwBvAG4AcwBpAHMAdABlAG4AYwB5ACAAaQBuACAAYQBjAGMAZQBzAHMAIAB0AG8AawBlAG4AIABwAGEAcgBhAG0AZQB0AGUAcgA=
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2010-04-20_05:2010-02-06, 2010-04-20, 2010-04-19 signatures=0
Subject: [OAUTH-WG] Consistency in access token parameter
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Apr 2010 07:46:55 -0000

There are potentially three names for access tokens in this spec:

- token
- access_token
- oauth_token

You hit the /oauth/access_token endpoint, and get back access_token=blah. Then you take that string and pass it to the protected resource as oauth_token=blah.

Developers that have prototyped things over here have found this to be confusing. It's simpler to just take the same named param everywhere.

I vote that one of two things happen:

1/ Return oauth_token from the access token endpoint.
2/ Accept access_token on the protected resource endpoint.
3/ Return "token" (and still "refresh_token") from the access_token endpoint, and accept "token" on the protected resource.

I know there will be infinite debate about the right way to do this, but just wanted some thoughts for now. I will probably choose #2 as that seems most explicit, even though it's a few more characters.