Re: [OAUTH-WG] in-app logout?

2010-05-20 Thread Chasen Le Hara
On Sun, May 16, 2010 at 11:27 AM, Dick Hardt wrote: > Torsten: enabling a client to revoke a refresh token looks like a useful > mechanism. I anticipate it will be viewed as a vitamin feature rather than a > painkiller and will fall by the wayside unless the security conscience rally > to have it

Re: [OAUTH-WG] proposal for factoring out request signing in OAuth 2

2010-05-20 Thread Manger, James H
Dirk, A good approach would be to define a generic mechanism (say "MAC") for signing a request with a secret key. Define it to take two identities: an identity associated with the key (authentication identity); and another (~identity to act as / authorization identity / token). This mechanism n

Re: [OAUTH-WG] proposal for factoring out request signing in OAuth 2

2010-05-20 Thread Allen Tom
Hi Dirk- We at Yahoo would be very much against using the client secret for signing requests to Protected Resources, since this would require that the client secret be distributed to the PR endpoints. For security reasons, one of the design goals for WRAP was to keep the client secret a secret bet

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-20 Thread Manger, James H
Marius, >> I wouldn't be surprised if, in some scenarios, the token info gets too big >> to fit in a URI. In that case even the user-agent flow will need to make a >> direct request to get the token info, which is more likely to be delivered >> as JSON. OpenID and SAML have found they need thi

Re: [OAUTH-WG] proposal for factoring out request signing in OAuth 2

2010-05-20 Thread David Recordon
We're able to use the client secret for signing requests instead of a token secret, but my understanding is that this exists because of deployers who do not wish for their protected resources to have access to client secrets. --David On Thu, May 20, 2010 at 4:39 PM, Dirk Balfanz wrote: > Hi gu

[OAUTH-WG] proposal for factoring out request signing in OAuth 2

2010-05-20 Thread Dirk Balfanz
Hi guys, at today's interim meeting, we were discussing Brian Eaton's proposal for OAuth signatures. He was proposing a mechanism that would (1) do away with base string canonicalization, (2) allow for symmetric and public keys, and (3) allow for extensibility. He got homework from the group to p

[OAUTH-WG] Draft on the OAuth use cases

2010-05-20 Thread Zeltsan, Zachary (Zachary)
At the IETF 77 the need for documenting the OAuth use cases was discussed and I volunteered writing a draft. The draft has been published at http://www.ietf.org/id/draft-zeltsan-use-cases-oauth-00.txt. At today's interim meeting its presentation did not generate any controversy. Please provide yo

[OAUTH-WG] Questions about sections 3.2/3.3

2010-05-20 Thread Yaron Goland
I was reading through the spec and had some questions about 3.2 and 3.3 that I list below. Thanks, Yaron Section 3.2/3.3 - Handling requests without supported transport layer security Although optional in section 3.2 and mandatory in section 3.3 bot

[OAUTH-WG] Figure titles

2010-05-20 Thread Leah Culver
For extra readability can we add titles to the figures in the Internet- Drafts? I think it would make it easier to skim sections, such as the various flows. Here are my suggestions for titles for draft-ietf-oauth-v2-05: Figure 1 - Generic flow between client and server Figure 2 - Obtaining a

[OAUTH-WG] FW: New Version Notification for draft-zeltsan-use-cases-oauth-00

2010-05-20 Thread Zeltsan, Zachary (Zachary)
This is a link to the draft on the use cases that I presented at today's meeting. http://www.ietf.org/id/draft-zeltsan-use-cases-oauth-00.txt Zachary -Original Message- From: IETF I-D Submission Tool [mailto:idsubmiss...@ietf.org] Sent: Tuesday, May 18, 2010 2:07 AM To: Zeltsan, Zachary

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-20 Thread Eran Hammer-Lahav
Yes. The user is delegating access to the browser. EHL On 5/20/10 9:05 AM, "Dick Hardt" wrote: The image can be protected by both. Do you expect OAuth to be used with user present in the browser? On 2010-05-17, at 11:20 PM, Eran Hammer-Lahav wrote: Why can't an image be protected with both

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-20 Thread Marius Scurtescu
On Wed, May 19, 2010 at 6:33 PM, Manger, James H wrote: > Marius, > >> Only direct responses are JSON, form/url encoded >> still has to be used: >> - direct requests >> - through browser requests >> - through browser responses >> - through browser fragment responses > > A better solution would be

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-20 Thread Dick Hardt
The image can be protected by both. Do you expect OAuth to be used with user present in the browser? On 2010-05-17, at 11:20 PM, Eran Hammer-Lahav wrote: > Why can’t an image be protected with both Basic and OAuth? In this case the > browser is the OAuth client. > > EHL > > From: Dick Hardt

[OAUTH-WG] Remote participation

2010-05-20 Thread Hannes Tschofenig
Note: it takes us a bit to get setup here in the meeting venue but in any case here is the info for the remote participants Jabber: oa...@jabber.ietf.org Webex: > From: messen...@webex.com > Date: May 19, 2010 10:05:03 AM PDT > To: amor...@amsl.com > Subject: Meeting scheduled: OAuth Interim M

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-20 Thread Evan Gilbert
On Wed, May 19, 2010 at 6:33 PM, Manger, James H < james.h.man...@team.telstra.com> wrote: > Marius, > > > Only direct responses are JSON, form/url encoded > > still has to be used: > > - direct requests > > - through browser requests > > - through browser responses > > - through browser fragment