[OAUTH-WG] multi-level delegation

"Vrancken Bart bv" <Bart.bv.Vrancken@alcatel-lucent.com> Fri, 04 December 2009 09:11 UTC

Return-Path: <Bart.bv.Vrancken@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0A3433A6960 for <oauth@core3.amsl.com>; Fri, 4 Dec 2009 01:11:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.249
X-Spam-Level:
X-Spam-Status: No, score=-6.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v5JDg03EIwcw for <oauth@core3.amsl.com>; Fri, 4 Dec 2009 01:11:46 -0800 (PST)
Received: from smail3.alcatel.fr (smail3.alcatel.fr [64.208.49.56]) by core3.amsl.com (Postfix) with ESMTP id 3FBA53A695C for <oauth@ietf.org>; Fri, 4 Dec 2009 01:11:46 -0800 (PST)
Received: from FRVELSBHS05.ad2.ad.alcatel.com (frvelsbhs05.dc-m.alcatel-lucent.com [155.132.6.77]) by smail3.alcatel.fr (8.13.8/8.13.8/ICT) with ESMTP id nB49BLs8030873 for <oauth@ietf.org>; Fri, 4 Dec 2009 10:11:34 +0100
Received: from FRVELSMBS22.ad2.ad.alcatel.com ([155.132.6.56]) by FRVELSBHS05.ad2.ad.alcatel.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 4 Dec 2009 10:11:15 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 04 Dec 2009 10:11:15 +0100
Message-ID: <7A6D4815C5E8F74988784FEBD50F2F1E045C77BC@FRVELSMBS22.ad2.ad.alcatel.com>
In-Reply-To: <4B1830FA.7000402@stpeter.im>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [OAUTH-WG] multi-level delegation
Thread-Index: Acp0YaihepT+Qic8TheubYCO+WoMSwAW3YeA
References: <daf5b9570911082102u215dcf22gf0aeb2f3578e5ea0@mail.gmail.com> <daf5b9570911111754u49f72a0aia59814b5da497a51@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102B49@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911120745w2f576d1ej300723581e50f03f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102E58@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911130837q40d07388y1ae9b472be0ae57a@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102F1F@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A4E79C63-7B5C-4FBA-9DDA-5FEB35B9584D@microsoft.com> <a9d9121c0911301432y76487b39hed670f0ed609c768@mail.gmail.com> <cb5f7a380912010852j3251199dse8d10da469dafa@mail.gmail.com> <a9d9121c0912011022p746e187fn1ff8240dbcdde096@mail.gmail.com><5710F82C0E73B04FA559560098BF95B124EEB6B910@USNAVSXCHMBSA3.ndc.alcatel-lucent.com> <4B1830FA.7000402@stpeter.im>
From: Vrancken Bart bv <Bart.bv.Vrancken@alcatel-lucent.com>
To: oauth@ietf.org
X-OriginalArrivalTime: 04 Dec 2009 09:11:15.0973 (UTC) FILETIME=[BBADF350:01CA74C1]
X-Scanned-By: MIMEDefang 2.57 on 155.132.188.83
Subject: [OAUTH-WG] multi-level delegation
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Dec 2009 09:11:48 -0000

Hi folks,

An example of a case of multi-level delegation, formerly known as
"four-legged auth" is described in the ID
http://tools.ietf.org/html/draft-vrancken-oauth-redelegation-00 . If we
have a server that acts as a content manager or a mash-up for one or
multiple web services that uses OAuth and we want different clients to
connect to this server, with the standard, like it is today, we have 2
possibilities:
1. We distribute the OAuth credentials from the server to the different
client. (What is against the philosophy of OAuth and sometimes not even
possible)
2. We act as a proxy and the client can get all the content from our
server. (And why would we like to generate unnecessary internet traffic,
the idea of OAuth is to grant direct access)

If we assume that the server and the clients are part of 1 application
(act as one client/consumer) and we are not happy that credentials in
client applications could easily be hacked, the system described in the
ID will give some extra security. The hacked credentials are only valid
for one specific client. A policy could be that credentials on such
clients are more limited in time and limited in rights to improve the
security. The user mustn't be involved anymore to renew these
credentials, because the server could grant permission.

Another case could be that a user wants to grant a printing service (the
famous case in the original ID :-)) to have access to its private photos
stored at different photo sharing services, via a content manager. The
user shouldn't be bothered to go to the whole authorization flows again,
if the content manager could prove that he can act on the behalf of the
user.

These are just 2 cases, but I can assume there are a lot more...

Best regards,

Bart Vrancken