Re: [OAUTH-WG] SAML Assertion Draft Items [Item 1: client auth]

Brian Campbell <bcampbell@pingidentity.com> Sun, 10 July 2011 14:04 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 651C621F86B4 for <oauth@ietfa.amsl.com>; Sun, 10 Jul 2011 07:04:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.944
X-Spam-Level:
X-Spam-Status: No, score=-5.944 tagged_above=-999 required=5 tests=[AWL=0.033, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vdCVUaK-XKKy for <oauth@ietfa.amsl.com>; Sun, 10 Jul 2011 07:04:20 -0700 (PDT)
Received: from na3sys009aog118.obsmtp.com (na3sys009aog118.obsmtp.com [74.125.149.244]) by ietfa.amsl.com (Postfix) with ESMTP id 98F8721F8655 for <oauth@ietf.org>; Sun, 10 Jul 2011 07:04:20 -0700 (PDT)
Received: from mail-qy0-f171.google.com ([209.85.216.171]) (using TLSv1) by na3sys009aob118.postini.com ([74.125.148.12]) with SMTP ID DSNKThmxY4siqAp0D+1R3kXBuSRfB9Uyvtpn@postini.com; Sun, 10 Jul 2011 07:04:20 PDT
Received: by mail-qy0-f171.google.com with SMTP id 38so1169492qyl.16 for <oauth@ietf.org>; Sun, 10 Jul 2011 07:04:19 -0700 (PDT)
Received: by 10.224.38.208 with SMTP id c16mr3050268qae.176.1310306659106; Sun, 10 Jul 2011 07:04:19 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.224.28.201 with HTTP; Sun, 10 Jul 2011 07:03:49 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234501D4A0142@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CA+k3eCRfmNE=0-OMJsMb2v7UGeno1EzW8ycpDNNZgJhQuN05cQ@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234501D4A0142@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Sun, 10 Jul 2011 08:03:49 -0600
Message-ID: <CA+k3eCSxjBqXNTsaZNULgayGxYxLjHvHe7iJ4tDAuTX_5nZYZg@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] SAML Assertion Draft Items [Item 1: client auth]
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Jul 2011 14:04:21 -0000

Not before the submission deadline tomorrow.  Probably sometime before
submissions reopen.

On Sat, Jul 9, 2011 at 9:04 AM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> Sounds reasonable. Can you provide a schedule outline?
>
> EHL
>
>> -----Original Message-----
>> From: Brian Campbell [mailto:bcampbell@pingidentity.com]
>> Sent: Saturday, July 09, 2011 5:53 AM
>> To: Eran Hammer-Lahav
>> Cc: oauth
>> Subject: Re: [OAUTH-WG] SAML Assertion Draft Items [Item 1: client auth]
>>
>> Thanks for the response, Eran. I'm breaking this thread up into the distinct
>> issues.  Reply inline below to the first item about client auth.
>>
>> On Thu, Jul 7, 2011 at 11:24 PM, Eran Hammer-Lahav
>> <eran@hueniverse.com> wrote:
>> >
>> > > However, the SAML draft does not currently cover SAML for client
>> > > authentication and profiling draft-ietf-oauth-assertions would
>> > > suggest that it should.  Is there any general consensus as to if
>> > > SAML should be profiled as a client authentication method?  It is
>> > > certainly feasible but might require restructuring and retitling the draft.
>> >
>> > Are there use cases pending such functionality today? It would be a shame
>> to delay an otherwise useful draft when the functionality can be added later.
>>
>> I don't have any such use cases in the near future.  Perhaps others can speak
>> up? I personally see assertion based grants as being more important and
>> more immediately useful.  That was one of the reasons I was looking to keep
>> assertion grants and client assertion authentication separate.  That said,
>> Chuck has done a nice job with his general treatment of them together in
>> draft-ietf-oauth-assertions and the logical thing to do, in terms of how the
>> various documents play together, would be to have draft-ietf-oauth-saml2-
>> bearer cover client auth now too.
>