Re: [OAUTH-WG] Autonomous clients and resource owners (editorial)

Brian Eaton <beaton@google.com> Tue, 27 April 2010 06:33 UTC

Return-Path: <beaton@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E184C3A6A27 for <oauth@core3.amsl.com>; Mon, 26 Apr 2010 23:33:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.306
X-Spam-Level:
X-Spam-Status: No, score=-101.306 tagged_above=-999 required=5 tests=[AWL=-0.135, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dqo5um0GUfM2 for <oauth@core3.amsl.com>; Mon, 26 Apr 2010 23:33:35 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.35]) by core3.amsl.com (Postfix) with ESMTP id 22FC03A68EE for <oauth@ietf.org>; Mon, 26 Apr 2010 23:33:33 -0700 (PDT)
Received: from wpaz1.hot.corp.google.com (wpaz1.hot.corp.google.com [172.24.198.65]) by smtp-out.google.com with ESMTP id o3R6XKf3025619 for <oauth@ietf.org>; Mon, 26 Apr 2010 23:33:20 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1272350000; bh=dG4o3RffR+FS0NDPa+F9TGvjbLI=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=GvGu6FEhqaQGwN7YEJb2fn4if/PeblEXG66bhE11u+IJOeuhUA7zbeDiPVq9f6Nf+ +d/VFnHuzLhWRdvlPhNMQ==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:content-transfer-encoding:x-system-of-record; b=frZWyxD6O09slspE+ySXT3Tmv3Q2WAkI+woolADCTXNrqM/X8o0JXqcUzCDrlguER zQ6kt7cl6FqKkYOCkmC7w==
Received: from pwj5 (pwj5.prod.google.com [10.241.219.69]) by wpaz1.hot.corp.google.com with ESMTP id o3R6XIsG009644 for <oauth@ietf.org>; Mon, 26 Apr 2010 23:33:18 -0700
Received: by pwj5 with SMTP id 5so7939735pwj.34 for <oauth@ietf.org>; Mon, 26 Apr 2010 23:33:18 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.143.153.34 with SMTP id f34mr2650425wfo.2.1272349997903; Mon, 26 Apr 2010 23:33:17 -0700 (PDT)
Received: by 10.142.202.10 with HTTP; Mon, 26 Apr 2010 23:33:17 -0700 (PDT)
In-Reply-To: <4BD674BC.9080504@lodderstedt.net>
References: <C7FB5107.451C%cmortimore@salesforce.com> <4BD674BC.9080504@lodderstedt.net>
Date: Mon, 26 Apr 2010 23:33:17 -0700
Message-ID: <p2xdaf5b9571004262333x1552d589haf469cf307317e45@mail.gmail.com>
From: Brian Eaton <beaton@google.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: "Foiles, Doug" <Doug_Foiles@intuit.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Autonomous clients and resource owners (editorial)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Apr 2010 06:33:37 -0000

>From my perspective, the main thing is that the assertion flow can be
used to connect existing authentication systems with APIs that are
using OAuth2 for authorization.

This will let us leverage existing trust relationships across systems.

Note that this breaks, however, if the flow returns a refresh token.
Refresh tokens are a new trust relationship, and they require
additional user/administrator involvement to manage.

Cheers,
Brian

On Mon, Apr 26, 2010 at 10:23 PM, Torsten Lodderstedt
<torsten@lodderstedt.net> wrote:
> +1
>
> we need the assertion flow for the same purpose. Can we add a variant of the
> flow to section "End User Credentials Flows"?
>
> regards,
> Torsten.
>
> Am 26.04.2010 23:17, schrieb Chuck Mortimore:
>
> +1.
>
> Our primary use-cases for the assertion flow are for clients acting on
> behalf of users, and not autonomously.   I believe Eran already has this on
> his list of feedback when the assertion flow gets edited.
>
> We also have need for a 2 legged Oauth model, and are looking at the client
> credentials flow for exactly that purpose.
>
> -cmort
>
>
> On 4/25/10 10:34 AM, "Foiles, Doug" <Doug_Foiles@intuit.com> wrote:
>
> I have a bit of confusion on the Autonomous Client Flows … and specifically
> related to Eve’s comment below that suggests to me that the autonomous
> client is NOT ALWAYS the resource owner.
>
> Can the Autonomous Client Flows support clients that ARE NOT the actual
> resource owner?  For example for an Assertion Flow where the Subject of the
> SAML assertion is a user identity (and the resource owner) and not that of
> the client.
>
> Is the intent of the Client Credentials Flow to support something like
> Google’s “OAuth for Google Apps domains” 2 Legged OAuth use case?
>  http://code.google.com/apis/accounts/docs/OAuth.html.
>
> If the Autonomous Client Flows support clients that can act on behalf a
> resource owner that is not themselves  … it then seems the resource owner
> must provide some level of consent outside the OAuth specific flow.
>
> Thanks.
>
> Doug
>
>
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of
> Eve Maler
> Sent: Friday, April 23, 2010 7:21 AM
> To: OAuth WG
> Subject: [OAUTH-WG] Autonomous clients and resource owners (editorial)
>
>
> Regarding the second comment I made below: I realized last night that
> Sections 3.7.1 and 3.7.2 get this more correct, by saying that an autonomous
> client represents a "separate resource owner". So Section 2.2 definitely
> needs a slight change, from:
>
>
>
> "...and autonomous flows where the client is acting for itself (the client
> is also the resource owner)."
>
>
>
> to something like:
>
>
>
> "...and autonomous flows where the client is acting on behalf of a different
> resource owner."
>
>
>
> Thanks,
>
>
>
>             Eve
>
>
>
> On 21 Apr 2010, at 4:43 PM, Eve Maler wrote:
>
>
> Tacking this response to the end of the thread for lack of a better place to
> do it: The name "username" seems not quite apt in the case of an autonomous
> client that isn't representing an end-user. Would "identifier" be better?
> (Actually, it sort of reminds me of SAML's "SessionIndex"...) Or would the
> parameter be reserved for user-delegation flows?
>
>
>
> Speaking of autonomous clients, Section 2.2 -- among possibly other places
> -- states that an autonomous client is also the resource owner, but that's
> not always the case, is it? The client might be seeking access on behalf of
> itself. (FWIW, I made roughly this same comment on David's first draft on
> March 21, and he agreed with my suggested fix at the time.)
>
>
>
>             Eve
>
>
>
> Eve Maler
>
> eve@xmlgrrl.com
>
> http://www.xmlgrrl.com/blog
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>