John is correct.  

Also when using a URL identifier like a blog it is possible to publish a XRD 
via link headers as well.  
That helps make publishing meta-data open to a broader selection of users.

If a site wanted to have a oAuth protected XRD service there is nothing to stop 
that.

In XRI/XRDS resolution we had per service discovery, much the same as MS is 
proposing for similar reasons.

People criticized that in XRI/XRDS as being too complicated.  That is why it is 
not in the current XRD spec.

We do need to make a side by side comparison.

I know that people have asked for a JSON format XRD document option.   That is 
on the OASIS TC list of things to work on.

John Bradley
On 2010-10-29, at 3:35 PM, John Panzer wrote:

> I think that it would be good to have a writeup like this that describes the 
> differences and pros and cons of each approach. Perhaps on a Wiki page?
> 
> Some random thoughts:
> 
> One thing:  host-meta is highly cacheable, so the # of round trips will 
> hopefully be comparable for large services with significant traffic.  In fact 
> the user XRD is also cacheable as well so there can be zero round trips.  
> This proposal defines a mechanism separate from HTTP caching in order to 
> cache responses, it'd be good to have a rationale for doing that (and to have 
> an explanation of how this should interact with additional HTTP level 
> caching.)
> 
> This mechanism appears to require multiple round trips to a server if you 
> want to discover multiple services.  
> 
> This proposal seems to require that the /well-known provider run a 
> significant service on their endpoint, as opposed to just dropping a file in 
> place.  I think that the forwarding mechanism may be a way around that?  How 
> would I hook into this mechanism if I really only can drop static files on my 
> web server, but I can perhaps use cloud services that I've registered with to 
> actually power the discovery?
> 
> --
> John Panzer / Google
> [email protected] / abstractioneer.org / @jpanzer
> 
> 
> 
> On Fri, Oct 29, 2010 at 4:04 AM, Lukas Rosenstock <[email protected]> 
> wrote:
> Hello!
> This draft is looking nice, the idea and specification is simple and
> straightforward. I would like to draw the connection to other
> discovery approaches.
> 
> The introductory example in the draft was this one:
> GET 
> /.well-known/simple-web-discovery?principal=mailto:[email protected]&service=urn:adatum.com:calendar
> HTTP/1.1
> 
> This returns the following response:
> {
>  "locations":["http://calendars.proseware.com/calendars/joseph";]
> }
> 
> As per my understanding - please correct me if I'm wrong - this should
> be semantically equivalent to the following:
> 1) Perform host-meta discovery for example.com, which returns an XRD
> with the webfinger endpoint.
> 2) Do webfinger for [email protected].
> 3) The final XRD contains the following:
> <XRD>
> [...]
> <Link rel="urn:adatum.com:calendar"
> href="http://calendars.proseware.com/calendars/joseph"; />
> [...]
> </XRD>
> 
> Both approaches work, but SWD is a shortcut removes parsing
> requirements and fetching roundtrips from the client.
> 
> Thoughts, anyone?!
> 
> Regards,
>  Lukas Rosenstock
> 
> 2010/10/27 Mike Jones <[email protected]>:
> > Yaron Goland and I are submitting this Simple Web Discovery (SWD) draft
> > (attached and at
> > http://self-issued.info/docs/draft-jones-simple-web-discovery-00.html) for
> > consideration by the community to address this need.  SWD is simple to
> > understand and implement, enables different permissions to be applied to
> > discovery of different services, and is JSON-based.  I look forward to
> > discussing this with many of you next week at IIW.
> >
> >
> >
> >                                                                 -- Mike
> _______________________________________________
> OAuth mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> Openid-specs-ab mailing list
> [email protected]
> http://lists.openid.net/mailman/listinfo/openid-specs-ab

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to