Re: [OAUTH-WG] Issue: Split the authorization endpoint into two endpoints

"Manger, James H" <James.H.Manger@team.telstra.com> Fri, 16 April 2010 01:23 UTC

Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 261883A6A70 for <oauth@core3.amsl.com>; Thu, 15 Apr 2010 18:23:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.343
X-Spam-Level:
X-Spam-Status: No, score=-0.343 tagged_above=-999 required=5 tests=[AWL=0.558, BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ST+K6Qnie6hr for <oauth@core3.amsl.com>; Thu, 15 Apr 2010 18:23:23 -0700 (PDT)
Received: from ipxano.tcif.telstra.com.au (ipxano.tcif.telstra.com.au [203.35.82.200]) by core3.amsl.com (Postfix) with ESMTP id 85CBE28C103 for <oauth@ietf.org>; Thu, 15 Apr 2010 18:22:22 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.52,216,1270389600"; d="scan'208";a="1344077"
Received: from unknown (HELO ipcbni.tcif.telstra.com.au) ([10.97.216.204]) by ipoani.tcif.telstra.com.au with ESMTP; 16 Apr 2010 11:22:14 +1000
X-IronPort-AV: E=McAfee;i="5400,1158,5952"; a="796687"
Received: from wsmsg3704.srv.dir.telstra.com ([172.49.40.197]) by ipcbni.tcif.telstra.com.au with ESMTP; 16 Apr 2010 11:22:15 +1000
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3704.srv.dir.telstra.com ([172.49.40.197]) with mapi; Fri, 16 Apr 2010 11:22:14 +1000
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, OAuth WG <oauth@ietf.org>
Date: Fri, 16 Apr 2010 11:22:13 +1000
Thread-Topic: [OAUTH-WG] Issue: Split the authorization endpoint into two endpoints
Thread-Index: Acrcyz1lDoVqvOFmQEa2c5Oxsc3UxAANrWpw
Message-ID: <255B9BB34FB7D647A506DC292726F6E11257481003@WSMSG3153V.srv.dir.telstra.com>
References: <C7ECABE0.32344%eran@hueniverse.com>
In-Reply-To: <C7ECABE0.32344%eran@hueniverse.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Issue: Split the authorization endpoint into two endpoints
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Apr 2010 01:23:25 -0000

I strongly favour specifying 2 separate endpoints: one for where to redirect a user, another for direct client calls.

I agree with Marius that these two endpoints are different enough to be separate.
One is only used by users via browsers. The other is only used by client apps. These are different populations, using different authentication mechanisms, with different performance requirements, and different technologies.

The use of a type parameter is a poor tool to distinguishes these cases.

I guess 1 URI could default to the other if not defined.
1 URI could be allowed to be relative to the other to save some bytes.

-- 
James Manger


-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Eran Hammer-Lahav
Sent: Friday, 16 April 2010 4:41 AM
To: OAuth WG
Subject: [OAUTH-WG] Issue: Split the authorization endpoint into two endpoints

OAuth 2.0 defines a single authorization endpoint with a 'type' parameter
for the various flows and flow steps. There are two types of calls made to
the authorization endpoint:

- Requests for Access - requests in which an end user interacts with the
authorization server, granting client access.

- Requests for Token - requests in which the client uses a verification code
or other credentials to obtain an access token. These requests require
SSL/TLS because they always result in the transmission of plaintext
credentials in the response and sometimes in the request.

A proposal has been made to define two separate endpoints due to the
different nature of these endpoints:

On 4/6/10 4:06 PM, "Marius Scurtescu" <mscurtescu@google.com> wrote:

> Constraints for endpoints:
> access token URL: HTTPS and POST only, no user
> user authentication URL: HTTP or HTTPS, GET or POST, authenticated user
> 
> In many cases the above constraints can be enforced with configuration
> that sits in front of the controllers implementing these endpoints.
> For example, Apache config can enforce SSL and POST. Same can be done
> in a Java filter. Also a Java filter can enforce that only
> authenticated users hit the endpoint, it can redirect to a login page
> if needed.
> 
> By keeping two different endpoints all of the above is much simpler.
> Nothing prevents an authz server to collapse these two into one
> endpoint.

While requests for access do not require HTTPS, they should because they
involve authenticating the end user. As for enforcing HTTP methods (GET,
POST), this is simple to do both at the server configuration level or
application level.

On the other hand, having a single endpoint makes the specification simpler,
and more importantly, makes discovery trivial as a 401 response needs to
include a single endpoint for obtaining a token regardless of the flow (some
flows use one, others two steps).

A richer discovery later can use LRDD on the single authorization endpoint
to obtain an XRD describing the flows and UI options provided by the server.
But this is outside our scope.

Proposal: No change. Keep the single authorization endpoint and require
HTTPS for all requests.

EHL





_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth