[scim] Ben Campbell's No Objection on draft-ietf-scim-api-18: (with COMMENT)

"Ben Campbell" <ben@nostrum.com> Thu, 14 May 2015 20:46 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 169971A8968; Thu, 14 May 2015 13:46:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 72oOvNGJAkAZ; Thu, 14 May 2015 13:45:59 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A6DF1A887D; Thu, 14 May 2015 13:45:59 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Ben Campbell <ben@nostrum.com>
To: The IESG <iesg@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.0.3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150514204559.13359.54568.idtracker@ietfa.amsl.com>
Date: Thu, 14 May 2015 13:45:59 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/scim/cSI0gftQDpa4lo8EmKYUu3jZLDQ>
Cc: draft-ietf-scim-api.ad@ietf.org, draft-ietf-scim-api.shepherd@ietf.org, draft-ietf-scim-api@ietf.org, scim-chairs@ietf.org, scim@ietf.org
Subject: [scim] Ben Campbell's No Objection on draft-ietf-scim-api-18: (with COMMENT)
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 May 2015 20:46:01 -0000

Ben Campbell has entered the following ballot position for
draft-ietf-scim-api-18: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-scim-api/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Update: I've released my DISCUSS on this. All my DISCUSS items have been
resolved save the last one that I am moving to a comment. My point was to
make sure the concern was discussed--if the authors answer that the
working group thought about this want to keep it as is, that's okay with
me.

Former Discuss Point:

It's optional (MAY) to include the API version. If the version is
missing, the service provider SHOULD perform the operation using the most
recent supported version. This seems to allow the client and service
provider to disagree on the version being used. Does this cause an
interop problem if the later version is not backwards compatible? (Are
all new versions expected to be backwards compatible with old versions?)

[ I've removed comments that I think have been addressed.]

[...]

-- 2.1, last paragraph:

Just SHOULD? Do you invision situations where it might be reasonable
_not_ to take the threats into account?

Also, the reference to oath-assertions needs to be normative

-- 2.2, "... it MAY be acceptable"

[...]

-- 3.3, 3rd bullet:

How does a service provider know which attributes a client understands?

[...]


As worded, that sounds like a statement of fact.

-- 7.3:

That needs to be a normative reference. Also, why is this a SHOULD? Can
you envision scenarios where it might be reasonable for implementors NOT
to take the countermeasures into account?

-- 7.4:

Reference to oauth-assertions needs to be normative.

-- 7.6, 2nd bullet

[...]