On Fri, Apr 21, 2017 at 2:05 PM, Sanjeewa Malalgoda <[email protected]>
wrote:

> As i know oauth 2.0 spec doesn't say anything about validity period per
> dynamic client registered in the system. And if DCR endpoint accept
> optional parameters then we can send application default validity period
> along with DCR request.
>
According to [1].

POST /register HTTP/1.1
     Content-Type: application/json
     Accept: application/json
     Host: server.example.com

     {
      "redirect_uris": [
        "https://client.example.org/callback";,
        "https://client.example.org/callback2";],
      "client_name": "My Example Client",
      "client_name#ja-Jpan-JP":
         "\u30AF\u30E9\u30A4\u30A2\u30F3\u30C8\u540D",
      "token_endpoint_auth_method": "client_secret_basic",
      "logo_uri": "https://client.example.org/logo.png";,
      "jwks_uri": "https://client.example.org/my_public_keys.jwks";,
      "example_extension_parameter": "example_value"
     }

DCR endpoint accept additional parameters
("example_extension_parameter": "example_value") so we can send
validity period along with DCR request.

[1] https://tools.ietf.org/html/rfc7591#section-3.1

And then when we issue token we have to consider that parameter and
> generate token accordingly. I believe this need to handle at oauth level
> rather doing this in APIM application level. When we move forward we let
> user to use any oauth server to plug as key manager. In that case this
> feature may need to support from others as well(if token validity can pass
> as optional parameter then we will be able to handle this somehow).
>
> One other requirement we got recently was let user to pass desired
> validity period by the time they request token. And if that is not larger
> than default validity period issue token for requested validity period. it.
> In this case also spec do not say anything about validity. As a workaround
> in this case we can revoke token after we used it. But per application
> token validity requirement don't have such workaround.
>
> I think this is good feature to have in our default oauth 2.0
> implementation.
>
> Thanks,
> sanjeewa.
>
> On Fri, Apr 21, 2017 at 1:00 PM, Asela Pathberiya <[email protected]> wrote:
>
>> Hi IS/APIM team,
>>
>> Is $subject in our roadmap ?  This seems to be a required features.
>> Different applications may need the different user token expiry time based
>> on their security level.
>>
>> Just heard that; IOT server may has already requirement with that;  It is
>> needed to define a token expiry level based on their device type.  Say;
>>  some device's token may be embedded & these token may have longer expiry
>> time (never expired).  Also;  some devices type need a  less expiry time
>> based on their security policies.   It is not sure how we are handled this
>> with APIM feature without $subject.   But;  this can be easily handled, if
>> we can have such feature inbuilt.
>>
>> Thanks,
>> Asela
>>
>>
>> --
>> Thanks & Regards,
>> Asela
>>
>> ATL
>> Mobile : +94 777 625 933 <+94%2077%20762%205933>
>>              +358 449 228 979
>>
>> http://soasecurity.org/
>> http://xacmlinfo.org/
>>
>
>
>
> --
>
> *Sanjeewa Malalgoda*
> WSO2 Inc.
> Mobile : +94713068779 <+94%2071%20306%208779>
>
> <http://sanjeewamalalgoda.blogspot.com/>blog :http://sanjeewamalalgoda.
> blogspot.com/ <http://sanjeewamalalgoda.blogspot.com/>
>
>
>
> _______________________________________________
> Architecture mailing list
> [email protected]
> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>
>


-- 
Gayan Gunawardana
Software Engineer; WSO2 Inc.; http://wso2.com/
Email: [email protected]
Mobile: +94 (71) 8020933
_______________________________________________
Architecture mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to