Re: [OAUTH-WG] Client Association alternative to Dyn Reg and stateless oauth client

Phil Hunt <phil.hunt@oracle.com> Sun, 03 November 2013 18:13 UTC

Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF97C11E82CA for <oauth@ietfa.amsl.com>; Sun, 3 Nov 2013 10:13:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.603
X-Spam-Level:
X-Spam-Status: No, score=-5.603 tagged_above=-999 required=5 tests=[AWL=-0.401, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SJxthTNy2WSD for <oauth@ietfa.amsl.com>; Sun, 3 Nov 2013 10:13:15 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id C9E8411E80F8 for <oauth@ietf.org>; Sun, 3 Nov 2013 10:13:15 -0800 (PST)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id rA3IDD2c008927 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sun, 3 Nov 2013 18:13:14 GMT
Received: from aserz7022.oracle.com (aserz7022.oracle.com [141.146.126.231]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id rA3IDC57004951 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 3 Nov 2013 18:13:13 GMT
Received: from abhmt103.oracle.com (abhmt103.oracle.com [141.146.116.55]) by aserz7022.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id rA3IDC5L004948; Sun, 3 Nov 2013 18:13:12 GMT
Received: from [192.168.1.125] (/174.7.250.104) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Sun, 03 Nov 2013 10:13:12 -0800
References: <F4DD5BCF-D5C3-4C67-9B05-0F235A7B9431@oracle.com> <CABzCy2Cv6SJem_WCKopXfjkPjRHWO6RON017PSRMTuK3zE4fqg@mail.gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <CABzCy2Cv6SJem_WCKopXfjkPjRHWO6RON017PSRMTuK3zE4fqg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-C0B8F3D3-5817-459D-9A1C-7EA351DC0654"
Content-Transfer-Encoding: 7bit
Message-Id: <0E4AEA37-67BC-478D-B7BC-ED7D5558416F@oracle.com>
X-Mailer: iPhone Mail (11B511)
From: Phil Hunt <phil.hunt@oracle.com>
Date: Sun, 03 Nov 2013 10:13:09 -0800
To: Nat Sakimura <sakimura@gmail.com>
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: oauth list <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Client Association alternative to Dyn Reg and stateless oauth client
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 03 Nov 2013 18:13:21 -0000

Nat 

I think software_id was equiv to class_id. The statement is intended to "lock" the reg profile between instances. 

The url returned could have another meta attr indicating what type of endpoint it is. Eg. Dyn reg, scim etc. 

Phil

> On Nov 3, 2013, at 5:05, Nat Sakimura <sakimura@gmail.com> wrote:
> 
> Thanks Phil. 
> 
> This is largely in-line with what I have been looking for since 2011 or so. 
> Instead of "software id", I was using the term "client class id" but that would be more or less equivalent, though I like "client class id" better than "software id" as a piece of software may imply client instance as well. 
> 
> I further was thinking that "client class id" should be a URI from which the authorization server can pull the "software statement"/"class properties" so that signing it would be optional and it could simply be a plain JSON. That would make it easier to fix the "software statement" bugs and adding more values (e.g. more language support) at a later date. 
> 
> As to the "association" is concerned, it would be really nice if the response includes the link relationship in the response JSON like in http://tools.ietf.org/html/draft-sakimura-oauth-meta . By doing so, the client instance can learn which authorization endpoint and so on that it should use [1]. This would allow the server to assign different endpoints to different client instances for scalability, security, billing and all sorts of other reasons. It would also achieve HATEOAS. 
> 
> As to the relationship with the dynreg draft is concerned, I kind of see dynreg as an API to talk to the software publisher. 
> 
> [1] I think it would be better return the discovery endpoint and have the client figure out where is its authorization endpoint than returning authorization endpoint directly but it can be either way. 
> 
> Cheers, 
> 
> Nat
> 
> 
> 2013/11/2 Phil Hunt <phil.hunt@oracle.com>
>> I would like to encourage people to read the client association draft before monday. http://tools.ietf.org/html/draft-hunt-oauth-client-association-00.txt and the related http://tools.ietf.org/html/draft-hunt-oauth-software-statement-00.txt
>> 
>> Most of the draft just focuses on background and taxonomy. If you are not interested, focus in on the dynamic association section. I believe you will find this alternate stateless approach to be very simple to implement and uses a well established pattern.
>> 
>> My position is that while the new approach represents a major change to OIDC implementors, the benefits outweigh the costs as it will make Connect much easier to support for service providers.
>> 
>> The key difference in approaches is that the software statement serves as a way to lock-down registration profiles that allow servers (and their policy systems) to recognize different types of client software.   Note that nothing about using software statements prevents developers from self-asserting registration.  Those scenarios can continue to work.   The key benefit to service providers and client developers is that the number of variations for registration options is dramatically reduced. The registration becomes a simple assertion swap with any allowable per-client overrides as an exception rather than the norm.
>> 
>> IOW -- client association places different emphasis on what happens when.  Client association assumes software characteristics are known at packaging time and does not vary widely (from the client side) other than having to handle different authentication policies of the various service providers.
>> 
>> I've already spent more text here explaining the difference than the core of the draft takes to explain the registration. So please read the draft before our discussion on monday.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.hunt@oracle.com
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> -- 
> Nat Sakimura (=nat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en