[OAUTH-WG] Opsdir last call review of draft-ietf-oauth-rar-23

Qin Wu via Datatracker <noreply@ietf.org> Mon, 15 May 2023 09:12 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 20BF4C1519A7; Mon, 15 May 2023 02:12:38 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Qin Wu via Datatracker <noreply@ietf.org>
To: ops-dir@ietf.org
Cc: draft-ietf-oauth-rar.all@ietf.org, last-call@ietf.org, oauth@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 10.3.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <168414195811.53789.7281622614039878965@ietfa.amsl.com>
Reply-To: Qin Wu <bill.wu@huawei.com>
Date: Mon, 15 May 2023 02:12:38 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/zCSBFGagW9q7BirODZRe3jUJG68>
Subject: [OAUTH-WG] Opsdir last call review of draft-ietf-oauth-rar-23
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 May 2023 09:12:38 -0000

Reviewer: Qin Wu
Review result: Has Issues

I have reviewed this document as part of the Ops area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Ops area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments.

This document extends oauth to support fine granularity access control. A new
Request parameter "authorization_details" is defined. Here are a few comments I
would like authors to consider: 1.The title of this draft focus only on rich
authorization request and seems not completely to reflect what it is about,
e.g., common fields defined in section can be used not just in authorization
request, but also in token exchange, e.g., token request and token response, or
in access tokens in JWT format or to Token Introspection responses. Would it be
great tweak the title to reflect what this draft is really about. 2.Do we have
a solution overview section to describe where the oauth message extensions are
exchanged? In which message? E.g., between oauth client and authorization
server or between authorization server and resource server? 3.Section 3 discuss
the relation with “scope” parameter and “resource” parameter, it looks
authorization request parameter can be used together with “scope” and
“resource”, can you provide two separate example to show how they work
together, is there any side effect of using them together? 4.It is not clear to
me why Comparing authorization details is needed, how such comparing operation
is different CRUD operation? Why not define token update message instead of
introducing comparing operation? 5.Section 10 said: “To advertise its support
for this feature, the supported list of
   authorization details types is included in the AS metadata response
”
What does this feature referred to in the above sentence? Rich authorization
request? Also the metadata is used by authorization server to advertise the
capability support to oauth client or resource server? It seems the client also
can indicate their selected choice in the authorization request? See relevant
text below: “ Clients MAY indicate the authorization details types they will use
   when requesting authorization with the client registration metadata
   parameter authorization_details_types

”
Also I feel that metadata exchange should take place before authorization
request/response exchange? No? Hope this comments help improve the readability
of the document.