Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2: URI(s)]
Brian Campbell <bcampbell@pingidentity.com> Sat, 09 July 2011 13:15 UTC
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A04721F8760 for <oauth@ietfa.amsl.com>; Sat, 9 Jul 2011 06:15:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.938
X-Spam-Level:
X-Spam-Status: No, score=-5.938 tagged_above=-999 required=5 tests=[AWL=0.039, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S3YqMoNeESs7 for <oauth@ietfa.amsl.com>; Sat, 9 Jul 2011 06:15:30 -0700 (PDT)
Received: from na3sys009aog104.obsmtp.com (na3sys009aog104.obsmtp.com [74.125.149.73]) by ietfa.amsl.com (Postfix) with ESMTP id 888FA21F86B4 for <oauth@ietf.org>; Sat, 9 Jul 2011 06:15:30 -0700 (PDT)
Received: from mail-qw0-f45.google.com ([209.85.216.45]) (using TLSv1) by na3sys009aob104.postini.com ([74.125.148.12]) with SMTP ID DSNKThhUchrV1S0woMBLbJLcUrMRqj8/5Mel@postini.com; Sat, 09 Jul 2011 06:15:30 PDT
Received: by qwj8 with SMTP id 8so1735890qwj.32 for <oauth@ietf.org>; Sat, 09 Jul 2011 06:15:29 -0700 (PDT)
Received: by 10.224.188.76 with SMTP id cz12mr953381qab.26.1310217329437; Sat, 09 Jul 2011 06:15:29 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.224.28.201 with HTTP; Sat, 9 Jul 2011 06:14:59 -0700 (PDT)
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Sat, 09 Jul 2011 07:14:59 -0600
Message-ID: <CA+k3eCTmxRfU9OoQB0yXRRTV9bn+LQph_q96=iA_gtejwSbk-A@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2: URI(s)]
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jul 2011 13:15:31 -0000
Discussion on the other item, the grant_type URI, inline below. This whole thing seems like it shouldn't be an issue at all as there's no functionality involved. But I've been hung up on it for a while and the spec needs some URI. I could *really* use the advice of the AD and/or Chairs on this. Or anyone with more experience with defining and using URIs/URNs. Thanks. On Thu, Jul 7, 2011 at 11:24 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote: > >> Item 2: URI(s) >> The value for grant_type is currently defined as >> http://oauth.net/grant_type/saml/2.0/bearer but there have been some >> questions raised about the stability and appropriateness of the URL. > > I'm not a fan. > >> I really did read RFCs 2648 & 3553, as was suggested at the last F2F meeting, >> but it's not clear to me how to register an IETF URI and/or if those RFCs are >> fully appropriate for this. If someone could explain it to me in terms my >> preschooler could understand, maybe I could jump though the proper hoops >> to get the URI to be something like urn:ietf:something:something. > > Asking on the URN list usually helps. I can try that. I'm thinking it'd be something like urn:ietf:wg:oauth:2.0:grant_type:saml:2.0:bearer which is largely based on seeing the use of urn:ietf:wg:oauth:2.0:oob - was there an actual registration done for that? Or did it just start getting used? Is doing that okay? > >> Otherwise, I can continue to use >> http://oauth.net/grant_type/saml/2.0/bearer and, assuming the draft >> should also cover client authentication, also define >> http://oauth.net/client_assertion_type/saml/2.0/bearer. The JWT version >> could then follow a similar pattern. Or perhaps we could use the URI, >> urn:oasis:names:tc:SAML:2.0:cm:bearer which is defined in section 3.3 of >> saml-profiles-2.0-os as URI that identifies the bearer subject confirmation >> method. It seems like that might be close enough to work out without >> violating anything serious. And it could be used for both grant_type and >> client_assertion_type, which is nice. > > Don't use an OASIS URN. That's asking for trouble. Is it really? Because it's conceptually inappropriate? Or because of some supposed (or real) rift between standards bodies? I mean, this whole draft is about profiling SAML assertions (an OASIS spec) for use with OAuth (soon an IETF spec). Would using a URN too be so terrible? You'd previously suggested (or asked why I didn't use) urn:oasis:names:tc:SAML:2.0:assertion which is the XML NS for the OASIS SAML assertion schema. Would that somehow be different? That is still an option too, I think. I hadn't used it because I wanted to differentiate the means of confirming/validating the assertion - as a bearer token - while leavening room for holder of key or other methods in the future. But using that NS wouldn't necessary preclude it. I was also looking for an identifier that would enable easy web searching and urn:oasis:names:tc:SAML:2.0:assertion wouldn't really do that.
- Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2… Brian Campbell
- Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2… Eran Hammer-Lahav
- Re: [OAUTH-WG] SAML Assertion Draft Items [Item 2… Mike Jones