Re: [OAUTH-WG] OAuth WG Re-Chartering

Eran Hammer <eran@hueniverse.com> Thu, 22 March 2012 16:35 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1BB521F8559 for <oauth@ietfa.amsl.com>; Thu, 22 Mar 2012 09:35:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.528
X-Spam-Level:
X-Spam-Status: No, score=-2.528 tagged_above=-999 required=5 tests=[AWL=0.070, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fLDOd8hKl5Pu for <oauth@ietfa.amsl.com>; Thu, 22 Mar 2012 09:35:17 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by ietfa.amsl.com (Postfix) with SMTP id 241CB21F854F for <oauth@ietf.org>; Thu, 22 Mar 2012 09:35:13 -0700 (PDT)
Received: (qmail 3540 invoked from network); 22 Mar 2012 16:35:10 -0000
Received: from unknown (HELO p3plex2out02.prod.phx3.secureserver.net) (184.168.131.14) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 22 Mar 2012 16:35:10 -0000
Received: from P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) by p3plex2out02.prod.phx3.secureserver.net with bizsmtp id ogb81i0060SoFT401gbA1j; Thu, 22 Mar 2012 09:35:10 -0700
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.20]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 22 Mar 2012 09:34:24 -0700
From: Eran Hammer <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>, Mike Jones <Michael.Jones@microsoft.com>
Date: Thu, 22 Mar 2012 09:34:24 -0700
Thread-Topic: [OAUTH-WG] OAuth WG Re-Chartering
Thread-Index: Ac0ISaQtVzDFD0ogRXuvfKDR6BZd+g==
Message-ID: <CB90A1A6.16C5D%eran@hueniverse.com>
In-Reply-To: <BE44AF40-2835-4E4E-A864-BFD7BFE12CAA@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.14.0.111121
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_CB90A1A616C5Deranhueniversecom_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Mar 2012 16:35:18 -0000

I really like the 5 items limit. If people are uncomfortable about leaving so many items off the charter, the charter can have an explicit line item for further charter review once all work has been completed. This is the default process anyway, but people here tend to be over sensitive, you that's one way to address that concern.

Any item proposed must be supported by an existing I-D used as the basis for WG work, at least one editor with the capacity to see this work through, and sufficient WG interest to do the work. It must also be 100% relevant to OAuth and belong in a security area working group.

I strongly believe that suggesting charter items without an existing draft is counter productive. If the work exists elsewhere, it must first be submitted as an I-D before we discuss it.

EH


From: Phil Hunt <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
Date: Thu, 22 Mar 2012 09:24:37 -0700
To: Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>>
Cc: "oauth@ietf.org<mailto:oauth@ietf.org>" <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering

Would the plan be for the Connect Registration spec to be submitted to IETF so they can become WG drafts?

The spec seems like a good starting point.

Phil

@independentid
www.independentid.com<http://www.independentid.com>
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>





On 2012-03-22, at 8:34 AM, Mike Jones wrote:

FYI, the OpenID Connect dynamic client registration spec is at http://openid.net/specs/openid-connect-registration-1_0.html.  You can find points to all the Connect specs at http://openid.net/connect/.

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-bounces@ietf.org] On Behalf Of George Fletcher
Sent: Thursday, March 22, 2012 6:28 AM
To: Torsten Lodderstedt
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering

Hi Torsten,

I guess I worry that trying to solve all the use cases that get pulled in with dynamic client registration will take a long time. I've been involved with both the UMA work and the OpenID Connect work regarding dynamic client registration and some reasonable constraints and expectations need to be set in order to reach consensus.

And what John said... since he beat my response:)

Thanks,
George

On 3/22/12 4:40 AM, Torsten Lodderstedt wrote:

Hi George,

I see two distinct areas of interoperability, which are Client-AS and AS-RS. Dynamic client registration belongs to Client-AS whereas JWT & AS-RS communication belong to the later area.

OAuth 2.0 currently (not fully) covers Client-AS and does not address AS-RS. In my opinion, the WG should decide whether we first complete Client-AS and address AS-RS later on or vice versa.

I'm in favour of completing Client-AS first and consider client registration a major missing piece. Why? Because otherwise clients cannot dynamically bind to any OAuth-AS at runtime but have to pre-register (with any?) :-(.

regards,
Torsten.



Am 21.03.2012 21:50, schrieb George Fletcher:

+1 to JWT and AS-RS communication over dynamic registration

On 3/21/12 3:52 PM, John Bradley wrote:

I don't think dynamic registration completely removes the need for a public client, that can't keep secrets.



While we did do dynamic client registration for Connect that is a more constrained use case.

I would put JWT and AS-RS communication as higher priorities than dynamic registration.

Partially because they are more self contained issues.



John B.

On 2012-03-21, at 4:35 PM, Torsten Lodderstedt wrote:



In my opinion, dynamic client registration would allow us to drop public client thus simplifying the core spec.



regards,

Torsten.



Am 15.03.2012 16:00, schrieb Eran Hammer:

I believe most do, except for the dynamic client registration. I don't have strong objections to it, but it is the least important and least defined / deployed proposal on the list. The AS->RS work is probably simpler and more useful at this point.



EH



-----Original Message-----

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-bounces@ietf.org] On Behalf

Of Tschofenig, Hannes (NSN - FI/Espoo)

Sent: Thursday, March 15, 2012 4:47 AM

To: ext Blaine Cook; Hannes Tschofenig

Cc: oauth@ietf.org<mailto:oauth@ietf.org>

Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering



Hi Blaine,



These are indeed good requirements you stated below.



When you look at the list of topics do you think that the proposed items

indeed fulfill them?



Ciao

Hannes





-----Original Message-----

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-bounces@ietf.org] On Behalf

Of ext Blaine Cook

Sent: Thursday, March 15, 2012 1:31 PM

To: Hannes Tschofenig

Cc: oauth@ietf.org<mailto:oauth@ietf.org> WG

Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering



On 14 March 2012 20:21, Hannes Tschofenig



wrote:

So, here is a proposal:



[Editor's Note: New work for the group. 5 items maximum! ]



Aug. 2012    Submit 'Token Revocation' to the IESG for consideration

as a Proposed Standard

Nov. 2012    Submit 'JSON Web Token (JWT)' to the IESG for

consideration as a Proposed Standard

Nov. 2012    Submit 'JSON Web Token (JWT) Bearer Token Profiles for

OAuth 2.0' to the IESG for consideration

Jan. 2013    Submit 'OAuth Dynamic Client Registration Protocol' to

the IESG for consideration as a Proposed Standard

Sep. 2012    Submit 'OAuth Use Cases' to the IESG for consideration

as an Informational RFC



This looks great to me.



I have serious concerns about feature-creep, and think that the OAuth

WG should strongly limit its purview to these issues. In general, I

think it prudent for this working group in particular to consider

standardisation of work only under the following criteria:



1. Proposals must have a direct relationship to the mechanism of OAuth

(and not, specifically, bound to an application-level protocol).

2. Proposals must have significant adoption in both enterprise and

startup environments.

3. Any proposal must be driven based on a consideration of the

different approaches, as adopted in the wild, and strive to be a

better synthesis of those approaches, not a means to an end.



These are the constraints with which I started the OAuth project, and

they're more relevant than ever. I'd hate to see OAuth fail in the end

because of a WS-*-like death by standards-pile-on.



b.

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth





_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth