Re: [OAUTH-WG] OAuth WG Sessions @ IETF115

2022-10-18 Thread Rifaat Shekh-Yusef
We needed to move the second side session to later time. Here is the new
list of sessions:

We have two official sessions:

   - Monday at 9:30am
   - Wednesday at 1:00pm


We also have two side sessions:

   - Tuesday at 2:00pm
   - *Thursday at 2:00pm*


Regards,
 Rifaat & Hannes



On Tue, Oct 18, 2022 at 5:06 AM Rifaat Shekh-Yusef 
wrote:

> All,
>
> We have two official sessions:
>
>- Monday at 9:30am
>- Wednesday at 1:00pm
>
>
> We also have two side sessions:
>
>- Tuesday at 2:00pm
>- Thursday at 10:00am
>
>
> Regards,
>  Rifaat & Hannes
>
>
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] [httpapi] Fwd: New Version Notification for draft-schwartz-httpapi-popup-authentication-00.txt

2022-10-18 Thread Salz, Rich


  *   This is a new draft that attempts to define a useful convention for HTTP 
authentication: a way to tell the client to open a browser window to start 
authentication, and to close that window when authentication is complete.

Sure.  Will 10 minutes+five for questions suffice?

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] AD review of draft-ietf-oauth-rar-12

2022-10-18 Thread Torsten Lodderstedt
Hi Roman, 

thanks for you review. 

I’m trying to do the next round for the outstanding issues you raised.

> Am 15.09.2022 um 00:30 schrieb Roman Danyliw :
> 
> Hi!
> 
> I performed an AD review of draft-ietf-oauth-rar-12.  Thanks for this 
> document.  My feedback is as follows:   
> 
> ** Section 2. Editorial
> 
> This field MUST be compared using an exact byte match of the string
>   value against known types by the AS.
> 
> Consider if you want to introduce how the lack of match will be handled here 
> - it is covered later.

I’m not sure how to handle this as there is no direct consequence (in the sense 
of error condition) other then that different byte arrays constitute different 
types. 

We could state something like this: "String values with different byte 
representations constitute different types.“ ? 

> 
> ** Section 2.2.
> 
> All data fields are OPTIONAL for use by a given API
>   definition.  
> 
> I don't follow how this is true in the general case.  I was under the 
> impression that this section defined what is expected to be common fields.  
> Couldn't some AS with a particular type require their presence?
> 
> ** Section 3.  Editorial
> 
> OLD
> In case of authorization requests as defined in [RFC6749],
>   implementors MAY consider to use
> 
> NEW
> In case of authorization requests as defined in [RFC6749],
>   implementors MAY consider using ...  
> 
> ** Section 3.  Typo. s/intiate/initiate/
> 
> ** Section 5.  Typo.
> 
> OLD
> authorization details type
>   or authorization details
> 
> NEW
> authorization_details type
>   or authorization_details

The spec uses authorization details types to refer to the general concept and 
authorization_details to refer to the parameter. I think the former is 
appropriate at this place. 

> 
> ** Section 6.1
> 
>  However, when comparing a new request to an existing request,
>   authorization servers can use the same processing techniques as used
>   in granting the request in the first place to determine if a resource
>   owner needs to authorize the request.   
> 
> Why is it possible to assess two arbitrary requests in this case to determine 
> "if a resource owner needs to authorize the request", but the prior paragraph 
> explicitly calls out that comparing two arbitrary requests is not feasible?  
> To me is seems like comparing two requests to understand if more or less 
> permissions are being requested is equivalent to determining if a new request 
> exceed the current request to determine if going back to the resource owner 
> is needed.
> 
> ** Section 6.1.  Typo. s/isaunce/issuance/
> 
> ** Section 7.
> 
>   If the client does not specify
>   the authorization_details token request parameters, the AS determines
>   the resulting authorization details at its discretion.  The
>   authorization server MAY consider the values of other parameters such
>   as resource and scope if they are present during this processing, and
>   the details of such considerations are outside the scope of this
>   specification.
> 
> This guidance seems to indicate the use of the scope parameter is optional in 
> determining the authorization details.  Section 3.1 says "The AS MUST 
> consider both sets of requirements in combination with each other for the 
> given authorization request."  My read is that this is conflicting guidance 
> and Section 3.1 is correct.

Justin: „You aren’t required to use “scope” in order to use 
“authorization_details”, but we do want to say that the AS is allowed to (or 
even is supposed to) consider both “scope” and “authorization_details” when 
determining the resulting access for any given request that might have both. 
The guidance in 3.1 should probably say “the AS MUST consider all requirements 
present on a request” or something like that?“

Section 3 already states that the AS must consider scope and resource in 
addition to authorisation details. I suggest to drop that sentence entirely.

> 
> ** Figure 15.  The text prior to this figure says that for "For our running 
> example, this would look like this" indicating that this figure is similar to 
> previous examples.  There is one key different - this is the first use of a 
> "payment_initiator" type with the API URL prepended.
> 
> ** Section 7.1. Typo. s/sub set/subset/
> 
> ** Section 8.  What is the difference between this section and Section 5 
> beyond this text explicitly stating the name of the error value 
> (invalid_authorization_details).  I'd recommend stating the normative 
> behavior twice; that is, why are both sections needed?

5 and 8 define the error behaviour of different endpoint. But you are right, 
the text is the same (with 5 being even more detailed). Suggest to remove the 
text in 8 with a reference to 5.

best regards,
Torsten. 

> 
> ** Section 9.2.  Editorial.  There is some kind of rendering issues in the 
> RFC7622 reference.  It reads "[!@RFC7662]".
> 
> ** Section 11.2.  
> 
>   Products supporting this specification should pro

[OAUTH-WG] OAuth WG Sessions @ IETF115

2022-10-18 Thread Rifaat Shekh-Yusef
All,

We have two official sessions:

   - Monday at 9:30am
   - Wednesday at 1:00pm


We also have two side sessions:

   - Tuesday at 2:00pm
   - Thursday at 10:00am


Regards,
 Rifaat & Hannes
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth