Re: [OAUTH-WG] SSO scenario
Peter Saint-Andre <stpeter@stpeter.im> Wed, 31 August 2011 19:13 UTC
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DA9621F8F1C for <oauth@ietfa.amsl.com>; Wed, 31 Aug 2011 12:13:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C0hNKuucQaSn for <oauth@ietfa.amsl.com>; Wed, 31 Aug 2011 12:13:10 -0700 (PDT)
Received: from stpeter.im (mailhost.stpeter.im [207.210.219.225]) by ietfa.amsl.com (Postfix) with ESMTP id 93ED421F8F1A for <oauth@ietf.org>; Wed, 31 Aug 2011 12:13:10 -0700 (PDT)
Received: from leavealone.cisco.com (unknown [128.107.239.233]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id CB0784174A; Wed, 31 Aug 2011 13:17:18 -0600 (MDT)
Message-ID: <4E5E881F.70901@stpeter.im>
Date: Wed, 31 Aug 2011 13:14:39 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.5; rv:6.0) Gecko/20110812 Thunderbird/6.0
MIME-Version: 1.0
To: Justin Karneges <justin@affinix.com>
References: <201108261604.57643.justin@affinix.com>
In-Reply-To: <201108261604.57643.justin@affinix.com>
X-Enigmail-Version: 1.3.1
OpenPGP: url=https://stpeter.im/stpeter.asc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] SSO scenario
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Aug 2011 19:13:11 -0000
I tried to help Justin off-list, but it would be nice to have a FAQ somewhere that shows developers how to translate from OAuth 1.1 to OAuth 2.0, even just conceptually (as in, "they got rid of the legs, how do I do two-legged auth in OAuth 2.0?!?"). On 8/26/11 5:04 PM, Justin Karneges wrote: > Hi folks, > > I currently use a proprietary token approach to provide authentication to a > browser widget, and I wonder if OAuth could be used to replace it. > > Here's how the system currently works: > - website supports authenticated users (happens via username/password form) > - website and widget provider have a shared secret > - the website serves a page to the browser, containing an embed of a remote > widget as well as a token that asserts the currently logged in user. the > widget takes this token and performs an ajax call to the widget provider > server. behold, the user is now logged in to the widget. > > In trying to organize this into OAuth terms and roles, here is what I come up > with: > - resource owner: the user > - resource server: widget provider (where the resource is generically "the > ability to utilize the widget") > - client: the webpage running in the browser > - authorization server: the website > > The website essentially serves up the client application and token in one > shot, so the client never has to explicitly ask for a token. However, the > client would then take that token and use it to access a service. The website > and widget provider would share key material such that token validation is > possible, but it's important to note that the two services are not owned and > operated by the same people. > > Does this seem right? Normally when I think of OAuth, I think of a user > giving a third-party service access to his personal stuff, but in the above flow > I'm proposing that OAuth be used so that the user gains access to his own > stuff. In fact, there would be no way to access his stuff other than this > approach, so it's not just about optional third-party access. It's the direct > and only access. > > Would love confirmation that OAuth is appropriate for my needs, and if I have > the roles right in that case. > > Thanks, > Justin > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] SSO scenario Justin Karneges
- Re: [OAUTH-WG] SSO scenario Peter Saint-Andre
- Re: [OAUTH-WG] SSO scenario Justin Richer
- Re: [OAUTH-WG] SSO scenario Justin Karneges
- Re: [OAUTH-WG] SSO scenario George Fletcher
- Re: [OAUTH-WG] SSO scenario Justin Karneges
- Re: [OAUTH-WG] SSO scenario Brian Campbell
- Re: [OAUTH-WG] SSO scenario John Bradley
- Re: [OAUTH-WG] SSO scenario Justin Karneges
- Re: [OAUTH-WG] SSO scenario Justin Richer