Re: [OAUTH-WG] [draft-ietf-oauth] Removed a repeated sentence in 3.1.2.2 (#1)

Eran Hammer-Lahav <eran@hueniverse.com> Mon, 15 August 2011 06:49 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06A7421F8834 for <oauth@ietfa.amsl.com>; Sun, 14 Aug 2011 23:49:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.561
X-Spam-Level:
X-Spam-Status: No, score=-2.561 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UpCrWGVqfq1l for <oauth@ietfa.amsl.com>; Sun, 14 Aug 2011 23:49:47 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by ietfa.amsl.com (Postfix) with SMTP id 8698321F87FA for <oauth@ietf.org>; Sun, 14 Aug 2011 23:49:47 -0700 (PDT)
Received: (qmail 9952 invoked from network); 15 Aug 2011 06:50:32 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 15 Aug 2011 06:50:32 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Sun, 14 Aug 2011 23:50:32 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Sun, 14 Aug 2011 23:49:20 -0700
Thread-Topic: [draft-ietf-oauth] Removed a repeated sentence in 3.1.2.2 (#1)
Thread-Index: Acxafv+73OTdUKHPTvCfaV3kPllGAAAmFCag
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234502498CDDD@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <hueniverse/draft-ietf-oauth/pull/1@github.com>
In-Reply-To: <hueniverse/draft-ietf-oauth/pull/1@github.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: alexbilbie <reply+i-1402979-e64eed155dddc31922fd2a2afcf51540a611956a@reply.github.com>
Subject: Re: [OAUTH-WG] [draft-ietf-oauth] Removed a repeated sentence in 3.1.2.2 (#1)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Aug 2011 06:49:48 -0000

Received via github:

> -----Original Message-----
> From: alexbilbie [mailto:reply+i-1402979-
> e64eed155dddc31922fd2a2afcf51540a611956a@reply.github.com]
> Sent: Sunday, August 14, 2011 5:38 AM
> To: Eran Hammer-Lahav
> Subject: [draft-ietf-oauth] Removed a repeated sentence in 3.1.2.2 (#1)
> 
> Hello,
> 
> I changed the first paragraph of section 3.1.2.2 from:
> 
>     The authorization server MUST require public clients to register
>     their redirection URI, MUST require all clients to register their
>     redirection URI prior to utilizing the implicit grant type, and
>     SHOULD require all clients to register their redirection URI prior to
>     utilizing the authorization code grant type.
> 
> to:
> 
>     The authorization server MUST require all clients to register their
>     redirection URI prior to utilizing the implicit grant type, and
>     SHOULD require all clients to register their redirection URI prior to
>     utilizing the authorization code grant type.
> 
> I think the phrase "MUST require public clients to register their redirection
> URI" was unnecessary when followed by "MUST require all clients to register
> their redirection URI"

Changed to:

              The authorization server SHOULD require all clients to register their redirection URI
              prior to using the authorization endpoint, and MUST require the following clients to
              register their redirection URI:

              o    Public clients.
              o    Confidential clients utilizing the implicit grant type.

EHL