Re: [OAUTH-WG] Reason why no user identifier?

William Mills <wmills@yahoo-inc.com> Sat, 11 September 2010 03:16 UTC

Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 21FC33A6831 for <oauth@core3.amsl.com>; Fri, 10 Sep 2010 20:16:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.526
X-Spam-Level:
X-Spam-Status: No, score=-17.526 tagged_above=-999 required=5 tests=[AWL=0.072, BAYES_00=-2.599, NO_RDNS_DOTCOM_HELO=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u3J9eLy7iobC for <oauth@core3.amsl.com>; Fri, 10 Sep 2010 20:16:23 -0700 (PDT)
Received: from mrout3.yahoo.com (mrout3.yahoo.com [216.145.54.173]) by core3.amsl.com (Postfix) with ESMTP id DEC583A6781 for <oauth@ietf.org>; Fri, 10 Sep 2010 20:16:23 -0700 (PDT)
Received: from SP2-EX07CAS04.ds.corp.yahoo.com (sp2-ex07cas04.corp.sp2.yahoo.com [98.137.59.5]) by mrout3.yahoo.com (8.13.8/8.13.8/y.out) with ESMTP id o8B3Ge12086337; Fri, 10 Sep 2010 20:16:40 -0700 (PDT)
Received: from SP2-EX07VS06.ds.corp.yahoo.com ([98.137.59.24]) by SP2-EX07CAS04.ds.corp.yahoo.com ([98.137.59.5]) with mapi; Fri, 10 Sep 2010 22:16:40 -0500
From: William Mills <wmills@yahoo-inc.com>
To: Jim Pravetz <jdp@cayosystems.com>
Date: Fri, 10 Sep 2010 22:16:39 -0500
Thread-Topic: [OAUTH-WG] Reason why no user identifier?
Thread-Index: ActRWE1wOeQzDaBSR1i/zE/KQrWCLAABychw
Message-ID: <FFDFD7371D517847AD71FBB08F9A31564B50F602@SP2-EX07VS06.ds.corp.yahoo.com>
References: <AANLkTimaXNz9tcjRuDULx07n72U20tXBc8pw6NuDS_vE@mail.gmail.com> <FFDFD7371D517847AD71FBB08F9A31564B50F5EE@SP2-EX07VS06.ds.corp.yahoo.com> <AANLkTi=7S6T8-C5bJhs5cZF6ZekfgWV89ApsX8d_KdTc@mail.gmail.com>
In-Reply-To: <AANLkTi=7S6T8-C5bJhs5cZF6ZekfgWV89ApsX8d_KdTc@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Reason why no user identifier?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Sep 2010 03:16:25 -0000

I doubt it wants to go into the core spec beyond the ability to extend easily.  You start to get into the semantics of what an identifier is and what is useful where.  My opinion is it wants to be either a small extension or a separate webservice call that allows the fetch.

> -----Original Message-----
> From: jpravetz@cayosystems.com [mailto:jpravetz@cayosystems.com] On
> Behalf Of Jim Pravetz
> Sent: Friday, September 10, 2010 7:23 PM
> To: William Mills
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Reason why no user identifier?
> 
> Thanks for the explanation, William.
> 
> Is there or should there be guidance in the spec for providing an
> optional user handle for when the token issuer trusts the client with
> this information?
> 
> Regards, Jim
> 
> On Fri, Sep 10, 2010 at 6:25 PM, William Mills <wmills@yahoo-inc.com>
> wrote:
> > There are use cases where the user does not wish to disclose anything
> extra in the 3 legged case.  For example, I am both a Yahoo and
> Facebook user, and I want to allow events to be published on Facebook
> when I comment on an article at Yahoo (there are many many of these
> kinds of pairings).  I don't want to tell Yahoo! my account name at
> Facebook, Yahoo gets a credential to use with Facebook that discloses
> nothing about me other than I am a Facebook user and I want Yahoo to
> use the updates API.
> >
> > Making a user identifier a requirement prevents these use cases.
>  There are other use cases where a site may want to provide a user
> handle separate from the token that can be used as a primary key, but
> again is opague and discloses nothing about the user.  The token can be
> used to fetch user information if the PR chooses to allow that.
> >
> >> -----Original Message-----
> >> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> Behalf
> >> Of Jim Pravetz
> >> Sent: Friday, September 10, 2010 6:03 PM
> >> To: oauth@ietf.org
> >> Subject: [OAUTH-WG] Reason why no user identifier?
> >>
> >> I'm curious and would appreciate some background as to why there is
> no
> >> user identifier associated with tokens (access, refresh, or
> >> authorization code)? It seems so common to use identifiers, and
> >> convenient, that this is a surprise. In contrast, the spec does
> define
> >> a client identifier.
> >>
> >> In my use case I have a client (native application) that stores
> >> records retrieved from a server, for one or more individuals (i.e. I
> >> maintain credentials for multiple users). Without a user identifier,
> >> it would seem that user identification would have to be retrieved
> from
> >> data returned from the protected resource, and it seems plausible
> that
> >> existing protocols might not have this capability.
> >>
> >> It would also seem more efficient to be able to determine if a user
> >> already has a local (on client) credential without going through the
> >> full process of getting an access token and retrieving a protected
> >> resource. For instance, if a user initiates an enrollment process
> the
> >> process could be stopped early if a token for a userid is already
> >> possessed.
> >>
> >> I would think the protected resource server would also benefit from
> a
> >> user identifier. At a minimum it would provide useful logging
> >> information for failed login attempts, and perhaps could be used in
> >> risk analysis.
> >>
> >> Apologies if this is an old topic or if I missed the explanation
> >> somewhere.
> >>
> >> Regards, Jim
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >