Hello..
 
Is there any interest in being able to respond with multiple 
oauth_verification_url values?  I can forsee the possibility of the 
Authorization Server being able to support browser-based user verification 
(http/https) or text messages (assuming we could authenticate the user on 
sending the SMS)..  Letting the authorization server return multiple URLs could 
give the client/user more options..
 
Also, would there be room in this profile for a scenario where the user 
verification code isn't returned to the client, but rather sent to the user 
directly?  If the initial request that the client makes includes some 
identifier for the user and the authorization server has contact information 
for that user, could the AS inform the user (via email, sms, IVR, etc) of a 
one-time user code that they would enter into the device*?  It's sort of the 
reverse model, but it should still establish a connection between the device, 
AS and user..  This profile might make sense where the device has very simple 
data entry options and the user might not be near a browser-capable device..
 
Saleem.

*Eve points out that this is somewhat simliar to the verification_code addition 
in the Oauth 1.0a spec to protect against session-fixation attacks 
(http://hueniverse.com/2009/04/explaining-the-oauth-session-fixation-attack/), 
especially the way it's communicated in WRAP's Rich App profile when the app in 
question can't be contacted by the AS with a URL..


-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of Brent 
Goldman
Sent: Thursday, March 11, 2010 4:28 AM
To: OAuth WG ([email protected])
Subject: [OAUTH-WG] Device Profile

Over the past couple days, Luke Shepard, David Recordon, and I have been 
brainstorming an OAuth profile for standardizing the flow that devices such as 
game consoles and entertainment centers use to hook up with services such as 
Netflix and iTunes. The basic flow is that a device can gain authorization by 
directing the user to visit a URL on their computer and to enter a verification 
code copied from the device's screen.

A draft spec is attached to this email. Any thoughts or feedback?

Note: this is one of the many profiles going into the OAuth 2.0 draft that 
David is writing (http://daveman692.livejournal.com/349384.html).

-Brent


_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to