FYI, the individual submission draft
http://tools.ietf.org/html/draft-jones-oauth-token-exchange describes adding
something analogous to WS-Trust token exchange to OAuth 2.0. That will be
discussed at the OAuth working group meeting tomorrow.
-- Mike
From: OAuth [mailto:[email protected]] On Behalf Of Gil Kirkpatrick
Sent: Wednesday, July 23, 2014 10:29 AM
To: 'Richard Snowden'; [email protected]
Subject: Re: [OAUTH-WG] Please help me understand OAuth 2.0
The RFCs 6749 and 6750 are a good place to start.
http://tools.ietf.org/html/rfc6749 and http://tools.ietf.org/html/rfc6750.
The first thing to understand is that OAuth2 targets a very specific use case
of a user authorizing an application (like Twitter) access to resources they
own (like photos) through a resource server (like Facebook). It’s more an
authN/authZ framework than a complete system, and doesn’t directly address the
traditional enterprise use cases. Once you get your head around that, the rest
is pretty straightforward. Because it’s lightweight and thin, OAuth2 can be
used in lots of authN/authZ scenarios, for instance OpenID Connect
http://openid.net/connect/ and UMA
http://docs.kantarainitiative.org/uma/draft-uma-core.html.
You’d be best off clearing your mind of SAML concepts and reading the RFCs, but
to answer your questions:
1. Not really. Access tokens represent a user-granted authorization for a
specific application to access a specific resource scope. The semantics of a
scopes are left to the developer, but you can think of a scope as a
representation of what access(es) are allowed to what resource(s). There is no
user identity information necessarily conveyed in the access token… that is
what OpenID Connect is for. OpenID Connect maps pretty closely to SAML.
2. Sort of. When the resource owner grants access, the AS issues an
authorization grant code. The client then presents the grant code to the AS for
an access token. The client includes the access token with each resource
request, and the resource server uses the scope in the token to determine if
access should be granted or not.
3. The role of the PDP is split between the AS and the RS. The AS provides
a token representing the user’s consent to access of a particular scope, and
the RS interprets the scope to grant access. The scope _could_ just be a
Boolean value indicating that access is allowed or not, in which case the AS
would be a PDP, but in practice the scope encodes a set of permissions that the
RS interprets in the context of the specific resource request.
HTH,
-gil
From: OAuth [mailto:[email protected]] On Behalf Of Richard Snowden
Sent: Wednesday, 23 July 2014 2:57 AM
To: [email protected]<mailto:[email protected]>
Subject: [OAUTH-WG] Please help me understand OAuth 2.0
I am pretty familiar with the WS-* and SOAP Web Services world. At the moment
I'm trying to understand which features are available in the OAuth 2.0 world.
1) SAML tokens: This access token in OAuth 2.0 - is it similar to what SAML
tokens are for?
2) STS: Is an OAuth 2.0 Authorization Server the equivalent to a STS?
3) PDP (Policy Decision Point): Is this also handled by the OAuth 2.0
Authorization Server? Or does the Resource Server, based on the access token,
have to make the decision whether or not grant access to a resource?
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth