Re: [OAUTH-WG] Autonomous clients and resource owners (editorial)

Eve Maler <eve@xmlgrrl.com> Mon, 26 April 2010 23:52 UTC

Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E0A33A6C07 for <oauth@core3.amsl.com>; Mon, 26 Apr 2010 16:52:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.168
X-Spam-Level: *
X-Spam-Status: No, score=1.168 tagged_above=-999 required=5 tests=[AWL=-0.140, BAYES_50=0.001, FROM_DOMAIN_NOVOWEL=0.5, HTML_MESSAGE=0.001, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U4ckIpYqRcKq for <oauth@core3.amsl.com>; Mon, 26 Apr 2010 16:52:22 -0700 (PDT)
Received: from mail.promanage-inc.com (eliasisrael.com [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id 5280428C206 for <oauth@ietf.org>; Mon, 26 Apr 2010 16:52:14 -0700 (PDT)
Received: from [192.168.168.198] ([192.168.168.198]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o3QNpuZi000812 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 26 Apr 2010 16:51:56 -0700
Mime-Version: 1.0 (Apple Message framework v1078)
Content-Type: multipart/alternative; boundary="Apple-Mail-872--186543480"
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <C7FB5107.451C%cmortimore@salesforce.com>
Date: Mon, 26 Apr 2010 16:51:56 -0700
Message-Id: <AB384145-EDE6-4175-9E34-6854D34709B2@xmlgrrl.com>
References: <C7FB5107.451C%cmortimore@salesforce.com>
To: Chuck Mortimore <cmortimore@salesforce.com>
X-Mailer: Apple Mail (2.1078)
Cc: "Foiles, Doug" <Doug_Foiles@intuit.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Autonomous clients and resource owners (editorial)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Apr 2010 23:52:24 -0000

In UMA, we've got use cases for "person-to-service" sharing that can act much like the user-delegated OAuth patterns of today (essentially introducing two services to interact on your own behalf), and also use cases for "person-to-person" sharing that involve a "separate resource owner", hence our interest in the autonomous client pattern or a variant thereof. We allow the original resource owner (we call them an authorizing user) to set policies asynchronously at the authorization manager (a sort of enhanced/user-centric authz server) that govern whether a requesting party can ultimately get a token. So in our case, this is how the resource owner gives consent outside the flow.

(BTW, the word "ownership" gets tricky in talking about resource access and other "property rights", which are famously described as a "bundle of sticks" to show that different parties might have different subsets of rights. E.g., in some UMA use cases, the authorizing user obviously has the right to throttle or audit who can see certain data, but they don't have the right to actually set the value of that data. Reputation data, such as a credit score or a third-party certification, is a classic example. It's hard to describe the data subject in this case as a total "resource owner"...)

	Eve

On 26 Apr 2010, at 2:17 PM, Chuck Mortimore wrote:

> +1.   
> 
> Our primary use-cases for the assertion flow are for clients acting on behalf of users, and not autonomously.   I believe Eran already has this on his list of feedback when the assertion flow gets edited.
> 
> We also have need for a 2 legged Oauth model, and are looking at the client credentials flow for exactly that purpose.  
> 
> -cmort
> 
> 
> On 4/25/10 10:34 AM, "Foiles, Doug" <Doug_Foiles@intuit.com> wrote:
> 
> I have a bit of confusion on the Autonomous Client Flows … and specifically related to Eve’s comment below that suggests to me that the autonomous client is NOT ALWAYS the resource owner.
>  
> Can the Autonomous Client Flows support clients that ARE NOT the actual resource owner?  For example for an Assertion Flow where the Subject of the SAML assertion is a user identity (and the resource owner) and not that of the client.
>  
> Is the intent of the Client Credentials Flow to support something like Google’s “OAuth for Google Apps domains” 2 Legged OAuth use case?  http://code.google.com/apis/accounts/docs/OAuth.html.
>  
> If the Autonomous Client Flows support clients that can act on behalf a resource owner that is not themselves  … it then seems the resource owner must provide some level of consent outside the OAuth specific flow. 
>  
> Thanks.
>  
> Doug
>  
> 
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Eve Maler
> Sent: Friday, April 23, 2010 7:21 AM
> To: OAuth WG
> Subject: [OAUTH-WG] Autonomous clients and resource owners (editorial)
> 
> 
> Regarding the second comment I made below: I realized last night that Sections 3.7.1 and 3.7.2 get this more correct, by saying that an autonomous client represents a "separate resource owner". So Section 2.2 definitely needs a slight change, from:
> 
> 
> 
> "...and autonomous flows where the client is acting for itself (the client is also the resource owner)."
> 
> 
> 
> to something like:
> 
> 
> 
> "...and autonomous flows where the client is acting on behalf of a different resource owner."
> 
> 
> 
> Thanks,
> 
> 
> 
>             Eve
> 
> 
> 
> On 21 Apr 2010, at 4:43 PM, Eve Maler wrote:
> 
> 
> Tacking this response to the end of the thread for lack of a better place to do it: The name "username" seems not quite apt in the case of an autonomous client that isn't representing an end-user. Would "identifier" be better? (Actually, it sort of reminds me of SAML's "SessionIndex"...) Or would the parameter be reserved for user-delegation flows?
> 
> 
> 
> Speaking of autonomous clients, Section 2.2 -- among possibly other places -- states that an autonomous client is also the resource owner, but that's not always the case, is it? The client might be seeking access on behalf of itself. (FWIW, I made roughly this same comment on David's first draft on March 21, and he agreed with my suggested fix at the time.)
> 
> 
> 
>             Eve
>  
> 
> 
> Eve Maler
> 
> eve@xmlgrrl.com
> 
> http://www.xmlgrrl.com/blog
> 
> 


Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog