Re: [OAUTH-WG] Fwd: New Version Notification for draft-hunt-oauth-v2-user-a4c-00.txt

John Bradley <ve7jtb@ve7jtb.com> Tue, 30 July 2013 15:48 UTC

Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6EB511E8218 for <oauth@ietfa.amsl.com>; Tue, 30 Jul 2013 08:48:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DvEdegR0-4Oy for <oauth@ietfa.amsl.com>; Tue, 30 Jul 2013 08:48:03 -0700 (PDT)
Received: from mail-pb0-f48.google.com (mail-pb0-f48.google.com [209.85.160.48]) by ietfa.amsl.com (Postfix) with ESMTP id 9F80E21F9931 for <oauth@ietf.org>; Tue, 30 Jul 2013 08:48:03 -0700 (PDT)
Received: by mail-pb0-f48.google.com with SMTP id ma3so2574671pbc.35 for <oauth@ietf.org>; Tue, 30 Jul 2013 08:48:02 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to:x-mailer:x-gm-message-state; bh=4xGzNxyCm1R9t/IA5pGhmw9tjmH1GrL1S9TIh6qRKRE=; b=AbRE/V1xlJMVvGL1amZg25DRMONS3ghfBh820t5V31nXsIEhJD4baa67nktYeJggRz ofxILPh9fEq0th+TzAwmRIYGBms9dRGODIStq3Nhnn7DmbQDuOE+oPCweHHZb/Bp0r1X JrrK1OI0EjFbb0+VMkVHyal1ERGm/6hhbw6ga6UaVzR1JwQ2Hd5UCfBBuM9pydSfJ0VP qjx0rdc+N9Sd0s4xreGNMzccjXSlNDcoR7pu0Q5TmxhS1Zxfwdj1pew0itfvlBhpH4aA DZcDaU5kK84PzF0vBs3j68tzyvWGx4bK6TdnzUykjoX2WLuDb+2xTJpbLwoINLwn3TYy nfqg==
X-Received: by 10.66.163.164 with SMTP id yj4mr51803496pab.91.1375199282156; Tue, 30 Jul 2013 08:48:02 -0700 (PDT)
Received: from ?IPv6:2001:df8::80:e54b:c4ff:1673:23ea? ([2001:df8:0:80:e54b:c4ff:1673:23ea]) by mx.google.com with ESMTPSA id ss8sm27752489pab.6.2013.07.30.08.47.59 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 30 Jul 2013 08:48:00 -0700 (PDT)
Content-Type: multipart/signed; boundary="Apple-Mail=_C280E0CD-C7AB-4536-AC67-E154F321CE5C"; protocol="application/pkcs7-signature"; micalg="sha1"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <E2282016-1953-48A4-B0AC-7F138D29AB80@oracle.com>
Date: Tue, 30 Jul 2013 17:47:59 +0200
Message-Id: <BAB6DA63-5831-49D0-8CB9-13CF57F78806@ve7jtb.com>
References: <787A2184-CE90-49F4-ABB6-B8D049AE3941@oracle.com> <E2282016-1953-48A4-B0AC-7F138D29AB80@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1508)
X-Gm-Message-State: ALoCoQmxa3rH8HBz5rlWaf8c1WZ5DXjV125e/iEcBT4V2mOMY36e/NntPnkx81O/uSGydTiepDUT
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-hunt-oauth-v2-user-a4c-00.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2013 15:48:07 -0000

Connect dosen't require a userinfo endpoint.   It is required for interoperability if you are building an open IdP.   For an enterprise type deployment discovery, registration, userifo are all optional.

The server is required to pass the nonce which is equivalent to a request ID through to the JWT if the client sends it in the request.

Justin is correct.

John B.
On 2013-07-30, at 5:30 PM, Phil Hunt <phil.hunt@oracle.com> wrote:

> Forgot reply all.
> 
> Phil
> 
> Begin forwarded message:
> 
>> From: Phil Hunt <phil.hunt@oracle.com>
>> Date: 30 July, 2013 17:25:46 GMT+02:00
>> To: "Richer, Justin P." <jricher@mitre.org>
>> Subject: Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-v2-user-a4c-00.txt
>> 
>> The whole point is authn only. Many do not want or need the userinfo endpoint. 
>> 
>> Phil
>> 
>> On 2013-07-30, at 17:17, "Richer, Justin P." <jricher@mitre.org> wrote:
>> 
>>> What do you mean? You absolutely can implement a compliant OIDC server nearly as simply as this. The things that you're missing I think are necessary for basic interoperable functionality, and are things that other folks using OAuth for authentication have also implemented. Namely:
>>> 
>>>  - Signing the ID token (OIDC specifies the RS256 flavor of JWS, which is easy to do with JWT). Without a signed and verifiable ID token or equivalent, you're asking for all kinds of token injection problems.
>>>  - Session management requests (max auth age, auth time)
>>>  - Not fall over with other parameters that you don't support (display, prompt, etc).
>>> 
>>> See here for more information:
>>> 
>>>   http://openid.net/specs/openid-connect-messages-1_0.html#ServerMTI
>>> 
>>> Additionally, something that's really important to support is the User Info Endpoint, so you can actually get user profile information beyond just the simple "someone was here" claim -- this was the real value of Facebook Connect from an RP's perspective. Some people will probably want to use SCIM for this, too, and that's fine.
>>> 
>>>  -- Justin
>>> 
>>> On Jul 30, 2013, at 10:54 AM, Phil Hunt <phil.hunt@oracle.com>
>>>  wrote:
>>> 
>>>> The oidc specs do not allow this simple an implementation. The spec members have not shown interest in making changes as they say they are too far down the road.
>>>> 
>>>> I have tried to make my draft as close as possible to oidc but maybe it shouldn't be clarity wise. I am interested in what the group feels is clearest. 
>>>> 
>>>> From an ietf perspective the concern is improper use of the 6749 for authn. Is this a bug or gap we need to address?
>>>> 
>>>> Phil
>>>> 
>>>> On 2013-07-30, at 16:46, "Richer, Justin P." <jricher@mitre.org> wrote:
>>>> 
>>>>> From what I read, you've defined something that uses an OAuth 2 code flow to get an extra token which is specified as a JWT. You named it "session_token" instead of "id_token", and you've left off the User Information Endpoint -- but other than that, this is exactly the Basic Client for OpenID Connect. In other words, if you change the names on things you've got OIDC, but without the capabilities to go beyond a very basic "hey there's a user here" claim. This is the same place that OpenID 2.0 started, and it was very, very quickly extended with SREG, AX, PAPE, and others for it to be useful in the real world of distributed logins. You've also left out discovery and registration which are required for distributed deployments, but I'm guessing that those would be modular components that could be added in (like they are in OIDC). 
>>>>> 
>>>>> I've heard complaints that OIDC is complicated, but it's really not. Yes, I agree that the giant stack of documents is intimidating and in my opinion it's a bit of a mess with Messages and Standard split up (but I lost that argument years ago). However, at the core, you've got an OAuth2 authorization server that spits out access tokens and id tokens. The id token is a JWT with some known claims (iss, sub, etc) and is issued along side the access token, and its audience is the *client* and not the *protected resource*. The access token is a regular old access token and its format is undefined (so you can use it with an existing OAuth2 server setup, like we have), and it can be used at the User Info Endpoint to get profile information about the user who authenticated. It could also be used for other services if your AS/IdP protects multiple things.
>>>>> 
>>>>> So I guess what I'm missing is what's the value proposition in this spec when we have something that can do this already? And this doesn't seem to do anything different (apart from syntax changes)?
>>>>> 
>>>>>  -- Justin
>>>>> 
>>>>> On Jul 29, 2013, at 4:14 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
>>>>> 
>>>>>> FYI.  I have been noticing a substantial number of sites acting as OAuth Clients using OAuth to authenticate users.
>>>>>> 
>>>>>> I know several of us have blogged on the issue over the past year so I won't re-hash it here.  In short, many of us recommended OIDC as the correct methodology.
>>>>>> 
>>>>>> Never-the-less, I've spoken with a number of service providers who indicate they are not ready to make the jump to OIDC, yet they agree there is a desire to support authentication only (where as OIDC does IDP-like services).
>>>>>> 
>>>>>> This draft is intended as a minimum authentication only specification.  I've tried to make it as compatible as possible with OIDC.
>>>>>> 
>>>>>> For now, I've just posted to keep track of the issue so we can address at the next re-chartering.
>>>>>> 
>>>>>> Happy to answer questions and discuss. 
>>>>>> 
>>>>>> Phil
>>>>>> 
>>>>>> @independentid
>>>>>> www.independentid.com
>>>>>> phil.hunt@oracle.com
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> Begin forwarded message:
>>>>>> 
>>>>>>> From: internet-drafts@ietf.org
>>>>>>> Subject: New Version Notification for draft-hunt-oauth-v2-user-a4c-00.txt
>>>>>>> Date: 29 July, 2013 9:49:41 AM GMT+02:00
>>>>>>> To: Phil Hunt <phil.hunt@yahoo.com>, Phil Hunt <None@ietfa.amsl.com>, Phil Hunt <>
>>>>>>> 
>>>>>>> 
>>>>>>> A new version of I-D, draft-hunt-oauth-v2-user-a4c-00.txt
>>>>>>> has been successfully submitted by Phil Hunt and posted to the
>>>>>>> IETF repository.
>>>>>>> 
>>>>>>> Filename: draft-hunt-oauth-v2-user-a4c
>>>>>>> Revision: 00
>>>>>>> Title: OAuth 2.0 User Authentication For Client
>>>>>>> Creation date: 2013-07-29
>>>>>>> Group: Individual Submission
>>>>>>> Number of pages: 9
>>>>>>> URL:             http://www.ietf.org/internet-drafts/draft-hunt-oauth-v2-user-a4c-00.txt
>>>>>>> Status:          http://datatracker.ietf.org/doc/draft-hunt-oauth-v2-user-a4c
>>>>>>> Htmlized:        http://tools.ietf.org/html/draft-hunt-oauth-v2-user-a4c-00
>>>>>>> 
>>>>>>> 
>>>>>>> Abstract:
>>>>>>>   This specification defines a new OAuth2 endpoint that enables user
>>>>>>>   authentication session information to be shared with client
>>>>>>>   applications.
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> Please note that it may take a couple of minutes from the time of submission
>>>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>>>> 
>>>>>>> The IETF Secretariat
>>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth