Hi Tomas,

Thank you for your comment. 
Some observations and questions: 
I have a hard time seeing a reasonable use case where a resource server (RS) 
would need several authz-info endpoints, one could however imagine a use case 
with a powerful server hosting several virtual resource servers (RS) under the 
same IP address and thus several different authz-info endpoints (one for each 
RS), but this does not sound like the typical Constrained Environment scenario 
to me. 
In order to better understand what this is about: If you have such a 
multi-tenant situation with a  .well-known for a default configuration, how 
would clients discover the non-default configurations? 
Also if a RS were to use the default URI (which is <hostname>/authz-info), why 
would it need to announce this in a .well-known? I would assume that this is 
only necessary if a non-default URI is used.

@ACE: This is far away from my area of expertise and at this point I cannot 
devote the necessary time to "read up" on this. Can someone help us find a good 
solution that that we can move draft-ietf-oauth-authz forward?

/Ludwig

-----Original Message-----
From: Ace <ace-boun...@ietf.org> On Behalf Of Tomas Gustavsson
Sent: den 2 juni 2020 07:19
To: ace@ietf.org
Subject: Re: [Ace] "default value" for authz-info endpoint

Hi,

In most cases where I've been involved with implementing a single RFC defined 
.well-known URL for actually servicing all end points, it ends up being one 
.well-known for default configuration, and multiple other (not .well-known) 
URLs in order to handle other configurations in multi-tennant scenarios.
I hope whatever .well-known scheme is selected will handle multi-tennancy, 
where thare can be differently configured service end points servicing from the 
same host/ip.
I.e. can one host server multiple authz-info? (does that make sense?)

Regards,
Tomas

On 2020-06-02 01:58, Benjamin Kaduk wrote:
> Hi Ludwig,
> 
> I'm confident that a well-known URI (or link relation) for discovery 
> of RS configuration/parameters would address the BCP 190 concerns.  
> What we need is an obvious path to not stomp on the server owner's 
> namespace, and whether we do that by letting the server tell us what 
> what path to use or by constraining ourself to a well-specified 
> cordoned-off corner reserved for our use is up to us.
> 
> Thanks for all the ideas and follow-up discussion!
> 
> -Ben
> 
> On Mon, Jun 01, 2020 at 09:13:13AM +0000, Seitz Ludwig wrote:
>> Hi Ben,
>>
>> I had a look at the well-known URI list at IANA and it seems that for 
>> vanilla OAuth 2.0 endpoints (authorization, token, introspect) there are no 
>> well-known URI:s either. What exists is an URI used by the authorization 
>> server to self-describe (including attributes giving the values of the 
>> endpoint's URIs).
>>
>> So my interpretation would be that instead of defining a well-known URI for 
>> authz-info, we need to define an attribute that a Resource Server can 
>> include in its well-known information to identify the authz-info endpoint 
>> URI it is exposing. 
>>
>> @Carsten (or other core experts): Would it make sense to define a new 
>> attribute in the /.well-known/core format for Resource Servers using coap?
>>
>> /Ludwig
>>
>>
>> -----Original Message-----
>> From: Ace <ace-boun...@ietf.org> On Behalf Of Benjamin Kaduk
>> Sent: den 31 maj 2020 00:36
>> To: ace@ietf.org
>> Subject: [Ace] "default value" for authz-info endpoint
>>
>> Hi all,
>>
>> I was prompted by the discussion at the interim to look more closely 
>> at what we say about the "default name" for endpoint URIs, e.g., the 
>> authz-info endpoint.  The last paragraph of
>> https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-33#section-5.8
>> .1
>> says:
>>
>>    The default name of this endpoint in an url-path is '/authz-info',
>>    however implementations are not required to use this name and can
>>    define their own instead.
>>
>> I've gotten advice from some URI experts that this doesn't give an 
>> easy/discoverable path (pun intended) to using a non-default value, which is 
>> problematic from the perspective of BCP 190 (and we should expect to get 
>> discussed at IESG evaluation time).  This sort of issue goes away if we 
>> allocate a well-known URI for authz-info from 
>> https://www.iana.org/assignments/well-known-uris/well-known-uris.xhtml and 
>> have that be the default.  In particular, that wouldn't actually stop any 
>> deployments from using /authz-info, but it does mean they'd have to 
>> knowingly "opt in" to doing so.
>>
>> What do people think?
>>
>> Thanks,
>>
>> Ben
>>
>> _______________________________________________
>> Ace mailing list
>> Ace@ietf.org
>> https://www.ietf.org/mailman/listinfo/ace
> 
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace
> 

_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to