*Interop*

I hear your pain -- unfortunately, per the title of the spec, OAuth is an
authorization framework -- it is something you can use to build something.
Given all the different use cases, full interop was not realistic.

Also, most clients are developed specific to an AS and resource -- so it
has not been a barrier to adoption for most deployments.

There is lots of discussion around automated registration currently --
something may come out of those discussions that drives more interop
between client and AS.

*Capabilities*

We do NOT want an AS to pick and choose capabilities that are REQUIRED in
OAuth 2.1

There is the question about where the optionality lies.


*Next Steps*
This has been a useful discussion for me. We are working on gathering the
differences between 2.1 and 2.0 -- and once we have that I'll come back
with a refined proposal.

Thanks to everyone that has provided feedback!

/Dick


On Tue, Sep 16, 2025 at 5:03 PM Michael Sweet <msw...@msweet.org> wrote:

> Dick,
>
> > On Sep 16, 2025, at 6:53 AM, Dick Hardt <dick.ha...@gmail.com> wrote:
> >
> > A motivation of the 2.1 spec is that an AS or client would declare they
> are compliant with 2.1 and not have a piecemeal set of features. IE there
> is a bar for compliance and an AS or client does not cherry pick the ones
> they like.
> >
> > I might be wrong, but features that drive security are not optional --
> and that is a key driver of 2.1 compliance.
>
> One of the most frustrating things for me as a developer WRT OAuth is that
> interoperability and discoverability have never been a high priority.  RFC
> 8414 went a long way towards solving the discoverability problem and it
> looks like OAuth 2.1 will help for interop.
>
> OIDC obviously has made some different choices but (for now at least) it
> is possible to write an OAuth client that also works with OIDC
> Authorization Servers.
>
> The remaining pain point is with client registration - dynamic client
> registration remains optional for both OAuth 2.1 and OIDC, which means it
> is impossible to write an OAuth client that doesn't require support for
> manually entering a client ID and secret for a given AS. This is bad UX and
> ultimately bad security.
>
> ________________________
> Michael Sweet
>
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to