Speaking for myself, yes.  Defining the simple ID_token grant showing how an ID 
token only can be returned is my minimum objective.

I think there needs to be some discussion in the WG on certain features which 
may be better suited only within OIDC and those features which fit better as a 
foundational piece in IETF OAuth WG.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com



On Jul 22, 2014, at 1:29 PM, Nat Sakimura <sakim...@gmail.com> wrote:

> What about just defining a new grant type in this WG?
> 
> 
> 2014-07-22 12:56 GMT-04:00 Phil Hunt <phil.h...@oracle.com>:
> That would be nice. However oidc still needs the new grant type in order to 
> implement the same flow. 
> 
> Phil
> 
> On Jul 22, 2014, at 11:35, Nat Sakimura <sakim...@gmail.com> wrote:
> 
>> +1 to Justin. 
>> 
>> 
>> 2014-07-22 9:54 GMT-04:00 Richer, Justin P. <jric...@mitre.org>:
>> Errors like these make it clear to me that it would make much more sense to 
>> develop this document in the OpenID Foundation. It should be something that 
>> directly references OpenID Connect Core for all of these terms instead of 
>> redefining them. It's doing authentication, which is fundamentally what 
>> OpenID Connect does on top of OAuth, and I don't see a good argument for 
>> doing this work in this working group.
>> 
>>  -- Justin
>> 
>> On Jul 22, 2014, at 4:30 AM, Thomas Broyer <t.bro...@gmail.com> wrote:
>> 
>>> 
>>> 
>>> 
>>> On Mon, Jul 21, 2014 at 11:52 PM, Mike Jones <michael.jo...@microsoft.com> 
>>> wrote:
>>> Thanks for your review, Thomas.  The “prompt=consent” definition being 
>>> missing is an editorial error.  It should be:
>>> 
>>>  
>>> 
>>> consent
>>> 
>>> The Authorization Server SHOULD prompt the End-User for consent before 
>>> returning information to the Client. If it cannot obtain consent, it MUST 
>>> return an error, typically consent_required.
>>> 
>>>  
>>> 
>>> I’ll plan to add it in the next draft.
>>> 
>>> 
>>> It looks like the consent_required error needs to be defined too, and you 
>>> might have forgotten to also import account_selection_required from OpenID 
>>> Connect.
>>>  
>>> 
>>>  
>>> 
>>> I agree that there’s no difference between a response with multiple “amr” 
>>> values that includes “mfa” and one that doesn’t.  Unless a clear use case 
>>> for why “mfa” is needed can be identified, we can delete it in the next 
>>> draft.
>>> 
>>> 
>>> Thanks.
>>> 
>>> How about "pwd" then? I fully understand that I should return "pwd" if the 
>>> user authenticated using a password, but what "the service if a client 
>>> secret is used" means in the definition for the "pwd" value?
>>> 
>>> (Nota: I know you're at IETF-90, I'm ready to wait 'til you come back ;-) )
>>> 
>>> -- 
>>> Thomas Broyer
>>> /tɔ.ma.bʁwa.je/
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> 
>> 
>> -- 
>> Nat Sakimura (=nat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> -- 
> Nat Sakimura (=nat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to