What people are doing now is often issuing saml like assertions. Thats not 
necessarily indicating intent. It just indicates transition. 

Phil

Sent from my phone.

On 2013-02-28, at 9:07, John Bradley <[email protected]> wrote:

> I am not advocating anything, only sting what people are doing now.
> 
> How authorization is communicated between the AS and RS via a token that is 
> opaque to the client is out of scope fro OAuth core, it might be magic pixy 
> dust.
> 
> This has lead to a number of ways people are doing it.
> 
> JWT along with  JOSE provide a container to get some claims from the AS to 
> the RS though the JWT is not specific to this and is used in the assertions 
> profile and other specs for many things other than access tokens.
> 
> Yes a profile of JWT for an access token as an access token is needed, Yes 
> further profiling is required for a JWT access token using MAC.
> 
> The format of the authorization claims is not tightly bound to MAC and might 
> be used with other bearer JWT tokens.
> 
> I don't know that there will be only one way to communicate those claims 
> because different sorts of implementations need different information for the 
> RS to act on.
> Recommendations are fine but defining a field called scope and passing on 
> exactly the scopes the client was granted is not going to work for everyone 
> for lots of good reasons.
> 
> John B.
> On 2013-02-28, at 8:24 AM, Phil Hunt <[email protected]> wrote:
> 
>> Are you advocating TWO systems? That seems like a bad choice. 
>> 
>> I would rather fix scope than go to a two system approach.
>> 
>> Phil
>> 
>> Sent from my phone.
>> 
>> On 2013-02-28, at 8:17, John Bradley <[email protected]> wrote:
>> 
>>> While scope is one method that a AS could communicate authorization to a 
>>> RS, it is not the only or perhaps even the most likely one.
>>> Using scope requires a relatively tight binding between the RS and AS,  UMA 
>>> uses a different mechanism that describes finer grained operations.  
>>> The AS may include roles, user, or other more abstract claims that the the 
>>> client may (god help them) pass on to EXCML for processing.
>>> 
>>> While having a scopes claim is possible, like any other claim it is not 
>>> part of the JWT core security processing claims, and needs to be defined by 
>>> extension.
>>> 
>>> John B.
>>> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <[email protected]> 
>>> wrote:
>>> 
>>>> Hi Mike, 
>>>> 
>>>> when I worked on the MAC specification I noticed that the JWT does not 
>>>> have a claim for the scope. I believe that this would be needed to allow 
>>>> the resource server to verify whether the scope the authorization server 
>>>> authorized is indeed what the client is asking for. 
>>>> 
>>>> Ciao
>>>> Hannes
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> [email protected]
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/oauth
> 
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to