Re: [OAUTH-WG] Concerning OAuth introspection
Mike Jones <Michael.Jones@microsoft.com> Wed, 30 January 2013 16:43 UTC
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D834A21F886B for <oauth@ietfa.amsl.com>; Wed, 30 Jan 2013 08:43:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RPapUbkR1Cfk for <oauth@ietfa.amsl.com>; Wed, 30 Jan 2013 08:43:02 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.28]) by ietfa.amsl.com (Postfix) with ESMTP id 82C3021F87DC for <oauth@ietf.org>; Wed, 30 Jan 2013 08:43:02 -0800 (PST)
Received: from BY2FFO11FD010.protection.gbl (10.1.15.203) by BY2FFO11HUB011.protection.gbl (10.1.14.82) with Microsoft SMTP Server (TLS) id 15.0.596.13; Wed, 30 Jan 2013 16:43:00 +0000
Received: from TK5EX14MLTC104.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD010.mail.protection.outlook.com (10.1.14.74) with Microsoft SMTP Server (TLS) id 15.0.596.13 via Frontend Transport; Wed, 30 Jan 2013 16:42:59 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.132]) by TK5EX14MLTC104.redmond.corp.microsoft.com ([157.54.79.159]) with mapi id 14.02.0318.003; Wed, 30 Jan 2013 16:42:36 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Justin Richer <jricher@mitre.org>, John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] Concerning OAuth introspection
Thread-Index: AQHN+NLaih7lXcajhEyfjdYsUHHYWJhWGdYAgAD2SICAABiJAIAAAPsAgAAA0gCAAAGWgIAABZMAgAAFGgCAARqSgIAAOpYAgAmHCYCAAAYZgIAABSew
Date: Wed, 30 Jan 2013 16:42:34 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943673E6800@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <CAHA4TYtCG+o0AZzh9e-3nb6gKLaWFeJuQfBxHVmUDH5Aj+TdpQ@mail.gmail.com> <50FEE1BF.5050200@mitre.org> <-6134323107835063788@unknownmsgid> <510005F5.6000004@mitre.org> <4a060479b5374e8ba58d3c9e1b15d917@BY2PR03MB041.namprd03.prod.outlook.com> <51001B5C.80407@mitre.org> <9a1d3f9d095e4f14b55ff99c9cf1799e@BY2PR03MB041.namprd03.prod.outlook.com> <51001D61.1060000@mitre.org> <1b7dbe92b69e4e51bbb0012f06381756@BY2PR03MB041.namprd03.prod.outlook.com> <51002656.2050900@mitre.org> <5101135F.5060000@gmail.com> <51014484.50001@mitre.org> <49792F1F-929D-4086-813B-C7383BDEAD4E@ve7jtb.com> <510947A5.3000904@mitre.org>
In-Reply-To: <510947A5.3000904@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.54.51.34]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(377454001)(377424002)(52314002)(51704002)(24454001)(164054002)(199002)(13464002)(189002)(479174001)(54356001)(550184003)(31966008)(53806001)(47736001)(51856001)(33656001)(63696002)(74662001)(20776003)(16406001)(5343655001)(15202345001)(47446002)(56776001)(77982001)(74502001)(49866001)(47776003)(47976001)(59766001)(23676001)(55846006)(54316002)(76482001)(44976002)(79102001)(50466001)(4396001)(50986001)(56816002)(46102001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB011; H:TK5EX14MLTC104.redmond.corp.microsoft.com; RD:; A:1; MX:1; LANG:en;
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0742443479
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Concerning OAuth introspection
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Jan 2013 16:43:04 -0000
I believe that what we have now - a single endpoint with an "operation" parameter, is more natural than having a different endpoint per operation. In all likelihood, the implementation of all the operations (client_register, client_update, and rotate_secret) would end up going through the same code path anyway, using an operation parameter. So let's just keep expressing it that way on the wire too. Having to maintain and register many endpoints for one logical set of functionality would just make things harder in a practical sense. Let's leave things the way they are. -- Mike -----Original Message----- From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Justin Richer Sent: Wednesday, January 30, 2013 8:18 AM To: John Bradley Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Concerning OAuth introspection On 01/30/2013 10:55 AM, John Bradley wrote: > My feeling was that letting the registration endpoint be a single URL (any url) and using query paramaters was easer for servers and clients. > > Saying take the base URI for the registration endpoint and append these paths to it to do different operations seems more likely to go wrong fro developers. Right, and to clarify, this isn't what I was saying. The spec wouldn't specify the path at all, just say that they're three different endpoint URLs. The same way that we specify that the auth endpoint and token endpoint are different URLs. I think my example might have been misleading. The URLs could just as easily be: client_register -> /register_a_new_client rotate_secret -> /client/go_get_a_secret_or_something client_update-> /maintenance/update_client_information > > Allowing both bath and query parameters is the worst option. > > I am sympathetic with using POST and PUT and perhaps GET but I worry about OAuth developers not getting it. > > I also don't get Tony's point about multi tenancy. If each tenant can have there own registration endpoint I don't see a problem beyond finding the endpoint and that is what we have WF for. Exactly. And to Bill's point in another thread, we could also register a link type for each endpoint to help facilitate discovery: http://tools.ietf.org/html/draft-wmills-oauth-lrdd-06 -- Justin > > John B. > > On 2013-01-24, at 11:26 AM, Justin Richer <jricher@mitre.org> wrote: > >> On 01/24/2013 05:56 AM, Sergey Beryozkin wrote: >>> I like this most, would rename it to say >>> >>> /oauth/client/registration >>> or >>> /oauth/client-registration >>> >>> etc >>> >>> and reword the spec such that it will let those who implement do it >>> with one endpoint or many, whatever is preferred >>> >> That's the whole point of this discussion -- I don't believe you can have it both ways. >> >> In one way, you say there are three endpoints and, if you're keeping with the rest of OAuth, you don't give them official URL patterns that they must follow. How the client gets those endpoints is up to discovery or configuration, but the client has an internal map from each bit of functionality to a particular URL that's specific to the service, much in the same way that the client today has to map the authorization and token endpoints. In the other method, you've got one endpoint that the client sends a well-defined parameter to in order to accomplish the same goal. >> >> So if you allow both at once, does a client send the "operation" parameter or not? Is it looking for one url or three to store in its configuration? I don't think this level of flexibility buys you anything useful, and I strongly believe that it will deeply hurt the functionality of dynamic registration if it's allowed. >> >> As it stands today, you can still make the URL whatever you want. If we went with three endpoints you could also make those URLs whatever you wanted. Nobody has yet pointed out to me what the actual benefit is of making both valid. >> >> I personally prefer the method of three endpoint URLs because it's cleaner and semantically equivalent, but I am hesitant to change that behavior unless there's strong working group support for it. I haven't seen real support for it yet -- it's not a good call to make it fully RESTful, and it's not a good call to leave it undefined. A client MUST have a very clear recipe of what to do on startup for this to work in the wild. >> >> -- Justin >> >>>> >>>> help multitenancy? How does it even affect that use case? Consider >>>> that the base URL for all of these is completely up to the host >>>> environment (nothing is bound to the root URL). Consider that >>>> clients still have to know what the URL (or URLs) are, in either >>>> case. Consider that clients still need to know how to manage all the parameters and responses. >>>> >>>> If anything, keeping it the way that it is with a single URL could >>>> be argued to help multitenancy because setting up routing to >>>> multiple URL endpoints can sometimes be problematic in hosted >>>> environments. However, OAuth already defines a bunch of endpoints, >>>> and we have to define at least one more with this extension, so I'm >>>> not convinced that having three with specific functions is really >>>> any different from having one with three functions from a >>>> development, deployment, and implementation perspective. I can tell >>>> you from experience that in our own server code, the difference is >>>> trivial. (And from OAuth1 experience, you can always have a query >>>> parameter as part of your endpoint URL if you need to. You might >>>> hate yourself for doing it that way, but nothing says your base URL >>>> can't already have parameters on it. A client just needs to know >>>> how to appropriately tack its parameters onto an existing URL, and >>>> any HTTP client worth its salt will know how to augment a query >>>> parameter set with new items.) >>>> >>>> The *real* difference between the two approaches is a philosophical >>>> design one. The former overloads one URL with multiple functions >>>> switched by a flag, the latter uses the URL itself as an implicit flag. >>>> Under the hood, these could (and in many cases will) be all served >>>> by the same chunks of code. The only difference is how this switch >>>> in functionality is presented. >>>> >>>> >>>> With that said, can somebody please explain to me how allowing >>>> *both* of these as options simultaneously (what I understand Tony >>>> to be >>>> suggesting) is a good idea, or how multitenancy even comes into play? >>>> Because I am completely not seeing how these are related. >>>> >>>> Thanks, >>>> -- Justin >>>> >>>> >>>> >>>> On 01/23/2013 12:46 PM, Anthony Nadalin wrote: >>>>> It will not work the way you have it, as people do multi-tendency different and they are already stuck with the method that they have chosen, so they need the flexability, to restrict this is nuts as people won't use it. >>>>> >>>>> -----Original Message----- >>>>> From: Justin Richer [mailto:jricher@mitre.org] >>>>> Sent: Wednesday, January 23, 2013 9:27 AM >>>>> To: Anthony Nadalin >>>>> Cc: Nat Sakimura; Shiu Fun Poon;oauth@ietf.org >>>>> Subject: Re: [OAUTH-WG] Concerning OAuth introspection >>>>> >>>>> I completely disagree with this assessment. Multi-tenancy will work just fine (or even better) if everyone uses the same pattern. Telling someone "it might be three different urls or it might be all one url with a parameter" is just asking for a complete disaster. What does the flexibility of allowing two approaches actually accomplish? >>>>> >>>>> You can argue about the merits of either approach, but having both as unspecified options for registration, which is meant to help things get going in a cold-boot environment, is just plain nuts. >>>>> >>>>> >>>>> -- Justin >>>>> >>>>> >>>>> >>>>> On 01/23/2013 12:21 PM, Anthony Nadalin wrote: >>>>>> Registration has to work in a multi-tenant environment so >>>>>> flexibility is needed >>>>>> >>>>>> -----Original Message----- >>>>>> From: Justin Richer [mailto:jricher@mitre.org] >>>>>> Sent: Wednesday, January 23, 2013 9:18 AM >>>>>> To: Anthony Nadalin >>>>>> Cc: Nat Sakimura; Shiu Fun Poon;oauth@ietf.org >>>>>> Subject: Re: [OAUTH-WG] Concerning OAuth introspection >>>>>> >>>>>> Because then nobody would know how to actually use the thing. >>>>>> >>>>>> In my opinion, this is a key place where this kind of flexibility is a very bad thing. Registration needs to work one fairly predictable way. >>>>>> >>>>>> -- Justin >>>>>> >>>>>> On 01/23/2013 12:14 PM, Anthony Nadalin wrote: >>>>>>> Why not just have a physical and logical endpoint options >>>>>>> >>>>>>> -----Original Message----- >>>>>>> From:oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On >>>>>>> Behalf Of Justin Richer >>>>>>> Sent: Wednesday, January 23, 2013 7:47 AM >>>>>>> To: Nat Sakimura >>>>>>> Cc: Shiu Fun Poon;oauth@ietf.org >>>>>>> Subject: Re: [OAUTH-WG] Concerning OAuth introspection >>>>>>> >>>>>>> Which brings up an interesting question for the Registration doc: right now, it's set up as a single endpoint with three operations. We could instead define three endpoints for the different operations. >>>>>>> >>>>>>> I've not been keen to make that deep of a cutting change to it, but it would certainly be cleaner and more RESTful API design. What do others think? >>>>>>> >>>>>>> -- Justin >>>>>>> >>>>>>> >>>>>>> On 01/22/2013 08:05 PM, Nat Sakimura wrote: >>>>>>>> "Action" goes against REST principle. >>>>>>>> I do not think it is a good idea. >>>>>>>> >>>>>>>> =nat via iPhone >>>>>>>> >>>>>>>> Jan 23, 2013 4:00、Justin Richer<jricher@mitre.org> のメッセージ: >>>>>>>> >>>>>>>>> (CC'ing the working group) >>>>>>>>> >>>>>>>>> I'm not sure what the "action/operation" flag would accomplish. The idea behind having different endpoints in OAuth is that they each do different kinds of things. The only "action/operation" that I had envisioned for the introspection endpoint is introspection itself: "I have a token, what does it mean?" >>>>>>>>> >>>>>>>>> Note that client_id and client_secret *can* already be used at this endpoint if the server supports that as part of their client credentials setup. The examples use HTTP Basic with client id and secret right now. Basically, the client can authenticate however it wants, including any of the methods that OAuth2 allows on the token endpoint. It could also authenticate with an access token. At least, that's the intent of the introspection draft -- if that's unclear, I'd be happy to accept suggested changes to clarify this text. >>>>>>>>> >>>>>>>>> -- Justin >>>>>>>>> >>>>>>>>> On 01/22/2013 01:00 PM, Shiu Fun Poon wrote: >>>>>>>>>> Justin, >>>>>>>>>> >>>>>>>>>> This spec is looking good.. >>>>>>>>>> >>>>>>>>>> One thing I would like to recommend is to add "action"/"operation" >>>>>>>>>> to the request. (and potentially add client_id and >>>>>>>>>> client_secret) >>>>>>>>>> >>>>>>>>>> So the request will be like : >>>>>>>>>> token REQUIRED >>>>>>>>>> operation (wording to be determine) OPTIONAL inquire (default) | revoke ... >>>>>>>>>> resource_id OPTIONAL >>>>>>>>>> client_id OPTIONAL >>>>>>>>>> client_secret OPTIONAL >>>>>>>>>> >>>>>>>>>> And for the OAuth client information, it should be an optional parameter (in case it is a public client or client is authenticated with SSL mutual authentication). >>>>>>>>>> >>>>>>>>>> Please consider. >>>>>>>>>> >>>>>>>>>> ShiuFun >>>>>>>>> _______________________________________________ >>>>>>>>> OAuth mailing list >>>>>>>>> OAuth@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>> _______________________________________________ >>>>>>> OAuth mailing list >>>>>>> OAuth@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>> >>>>>>> >>>>>>> >>>>>> >>>>> >>>>> >>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Nat Sakimura
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection Anthony Nadalin
- Re: [OAUTH-WG] Concerning OAuth introspection Eve Maler
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Anthony Nadalin
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Eve Maler
- Re: [OAUTH-WG] Concerning OAuth introspection Eve Maler
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Mike Jones
- Re: [OAUTH-WG] Concerning OAuth introspection Anthony Nadalin
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Todd W Lainhart
- Re: [OAUTH-WG] Concerning OAuth introspection Phil Hunt
- Re: [OAUTH-WG] Concerning OAuth introspection Eve Maler
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Brian Campbell
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection John Bradley
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Mike Jones
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection Anthony Nadalin
- Re: [OAUTH-WG] Concerning OAuth introspection Mike Jones
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection Justin Richer
- Re: [OAUTH-WG] Concerning OAuth introspection Sergey Beryozkin
- Re: [OAUTH-WG] Concerning OAuth introspection John Bradley
- Re: [OAUTH-WG] Concerning OAuth introspection Phil Hunt