Re: [OAUTH-WG] Returning tokens directly to a human user

Dick Hardt <dick.hardt@gmail.com> Fri, 06 March 2015 18:07 UTC

Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C42D11A1AB8 for <oauth@ietfa.amsl.com>; Fri, 6 Mar 2015 10:07:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j7PXEFC_S10C for <oauth@ietfa.amsl.com>; Fri, 6 Mar 2015 10:07:53 -0800 (PST)
Received: from mail-qg0-x22f.google.com (mail-qg0-x22f.google.com [IPv6:2607:f8b0:400d:c04::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8A641A1A97 for <oauth@ietf.org>; Fri, 6 Mar 2015 10:07:52 -0800 (PST)
Received: by qgea108 with SMTP id a108so14497279qge.8 for <oauth@ietf.org>; Fri, 06 Mar 2015 10:07:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=KD6XYbOVFRAjCIGwbcpdEUBeDDApo7OzdB3bhgxHW6o=; b=iyUTnARsmSgfkZtL75MkLH90BNpK1K1OH4NVhXTSq0xtKmW98fVLE3Yr/wKaoLI8LM 4hqaQbmEx/jkCxPh4KdRlVCAHulX09ls8KptkPPpz9lRV6pBWr1lP/XVVdEr2ZQyFbVi lmnG/qo3WoXoJcmyxFFju161ZUutaIDZpXgfIOlkkcxWkPVeM/ssvKxkk+dhpjjDz1jk yunvWlextA29X1oLZwhrlzB2/p5uaGAgi5aQekiBLKX0pwFI1VugYWFVrcZFrTtPWhy8 y52ciaJP+h/YvkNvst6KTo/7u+rv3Zg/9BDsdFFDxu3kyRv6m8d/CTgtjrh6TsrbDYF0 uhCA==
X-Received: by 10.55.41.69 with SMTP id p66mr31151254qkh.101.1425665271817; Fri, 06 Mar 2015 10:07:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.140.19.84 with HTTP; Fri, 6 Mar 2015 10:07:31 -0800 (PST)
In-Reply-To: <54F9E246.70901@gmail.com>
References: <54F59359.5020601@gmx.net> <2A7D9B45-2459-4558-8356-CAB1029D113D@MIT.EDU> <4E1F6AAD24975D4BA5B1680429673943A2E78D9F@TK5EX14MBXC292.redmond.corp.microsoft.com> <54F7C2B7.7090304@mit.edu> <4E1F6AAD24975D4BA5B1680429673943A2E79640@TK5EX14MBXC292.redmond.corp.microsoft.com> <54F9E246.70901@gmail.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Fri, 06 Mar 2015 10:07:31 -0800
Message-ID: <CAD9ie-v=i_QDVbdZ0eTZLMkWRqqKLKa9ec15JiMgGqrpMzh_yg@mail.gmail.com>
To: Sergey Beryozkin <sberyozkin@gmail.com>
Content-Type: multipart/alternative; boundary="001a1147af32186c290510a290af"
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/v9OlOXHc0KIBrMj5Kpht1y3HFn0>
Cc: Oauth Wrap Wg <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Returning tokens directly to a human user
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Mar 2015 18:07:54 -0000

If you are interested in how others have done a similar flow, you could
look at how smart TVs supporting Netflix and Amazon are authorized.

On Fri, Mar 6, 2015 at 9:22 AM, Sergey Beryozkin <sberyozkin@gmail.com>
wrote:

> Hi All,
>
> We might have a requirement to support a case where AS returns an access
> token directly to a human user, with the user subsequently configuring a
> confidential client with this token. The actual client is not capable of
> supporting a (more dynamic) code flow at this stage.
>
> So it is nearly like an implicit code flow except that the user is asked
> upfront which clients can get the tokens allocated and the token is
> returned in the HTML response without redirecting and placing the token in
> a fragment.
>
> Apparently a number of big providers do just that, let users allocate
> tokens for some clients with the users expected to copy the tokens into the
> confidential clients afterwards.
>
> I'd like to ask, it is a reasonable approach, to have tokens transferred
> manually into the confidential client ?
>
> Would it be more appropriate for a user to request a code and then copy it
> to the confidential client and expect it to get the tokens itself. I guess
> the problem here may be a code is short lived, but so is a typical access
> token - but the latter can be supported by a refresh one.
>
> Another question: does it even qualify as an OAuth2 grant for token
> exchange, the process of a user pre-authorizing a client and getting not a
> code but tokens back ? I guess it does, so how a grant like this one would
> typically be called ? We'd have no problems with assigning some custom name
> to such a grant but curious how others approach it...
>
> Thanks, Sergey
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>