- Problem 1: Several WG participants are working on deploying a federated
signon protocol based on OAuth2 (aka OpenIDConnect) and would like to return
an additional 'session cookie' together with the auth_token. Or sometimes
return only a cookie as the result of authorization, since cookies will
likely have shorter lifetimes than access tokens, for security and usability
reasons, and require more frequent refresh requirements. In any case, there
aremultiple reasons for making the cookie separate from the auth_token,
including both security and flexibility of deployment. However, there is no
way to express this except adding an arbitrary extension parameter (to
effectively express a different response type).

- Problem 2: Codification of code_and_token created controversy as there was
not enough traction among participants to put it in the core. However, it is
entirely possible that deployment experience will lead players to revisit
this topic.


- Proposed solution:

1. Allow response_type to be a space separated list of arbitrary strings

E.g.:

response_type=code
response_type=token
response_type=code+token
response_type=cookie
response_type=code+cookie
response_type=token+cookie
response_type=foo+bar

Would all be syntactically valid responses from the perspective of OAuth2.0
Core response_type values.


2. Define behaviors in the core only for values 'code' and 'token'. Allow
extensions to define what do with 'code+token' or with any other values or
combinations of values.

-- 
Breno de Medeiros
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to