Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-07 Thread Brian Campbell
te: *Wednesday, February 6, 2019 at 11:30 AM > *To: *"Richard Backman, Annabelle" > *Cc: *"Richard Backman, Annabelle" , oauth < > oauth@ietf.org> > *Subject: *Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser > clients using the token endpoint > >

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-06 Thread Brian Campbell
ufficiently deals with the fallout from that. In my >>> view this is a complex enough issue and it’s for a nuanced enough use case >>> (as far as I can tell from discussion? Please correct me if I’m wrong) that >>> we should punt it to a separate draft (e.g., “Authorization Server Metad

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-06 Thread Brian Campbell
t (e.g., “Authorization Server Metadata >> Extensions for mTLS Hybrids”) and get mTLS out the door. >> >> >> >> -- >> >> Annabelle Richard Backman >> >> AWS Identity >> >> >> >> >> >> *From: *OAuth on behalf

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-05 Thread Brian Campbell
ta > Extensions for mTLS Hybrids”) and get mTLS out the door. > > > > -- > > Annabelle Richard Backman > > AWS Identity > > > > > > *From: *OAuth on behalf of Brian Campbell > > *Date: *Monday, February 4, 2019 at 5:28 AM > *To: *"Richard Backman, An

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-05 Thread Brian Campbell
Filip did some testing along these lines awhile back. Although I think he was more focused on the other side of things by instructing the fetch/XHR request to omit sending credentials. The behavior he saw was that he wasn't able to suppress the certificate selection prompting as expected or hoped.

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-05 Thread Filip Skokan
Server Metadata Extensions > for mTLS Hybrids”) and get mTLS out the door. > > -- > Annabelle Richard Backman > AWS Identity > > > From: OAuth on behalf of Brian Campbell > > Date: Monday, February 4, 2019 at 5:28 AM > To: "Richard Backman, Annabelle"

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-05 Thread Neil Madden
I’m less and less convinced that a redirect is the best way to do this. I was reading the WHATWG Fetch spec yesterday, in particular the entries about CORS, and realised that for cross-origin requests TLS client certificates are treated as credentials just like cookies: https://fetch.spec.whatw

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-05 Thread Justin Richer
+1 to David. If it’s a redirect, 307 is more appropriate. It’s up to the AS to decide if the client should do MTLS or not, if there’s an option. — Justin On Feb 4, 2019, at 12:17 PM, David Waite mailto:da...@alkaline-solutions.com>> wrote: My understanding is that a permanent redirect would be

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-04 Thread David Waite
My understanding is that a permanent redirect would be telling the client (and any other clients getting cached results from an intermediary) to now stop using the original endpoint in perpetuity for all cases. I don’t think that is appropriate (in the general case) for an endpoint with request

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-04 Thread Brian Campbell
Those points of confusion strike me as somewhat hypothetical or hyperbolic. But your general point is taken and your position of being anti additional metadata on this issue is noted. All of which leaves me a bit uncertain about how to proceed. There seem to be a range of opinions on this point an

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-04 Thread Brian Campbell
Yeah, probably. On Sat, Feb 2, 2019 at 12:39 AM Neil Madden wrote: > If we go down the 307 route, shouldn’t it rather be a 308 (permanent) > redirect? It seems unnecessary for the client to keep trying the original > endpoint or have to remember cache-control/expires timeouts. > > — Neil > > On

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients using the token endpoint

2019-02-01 Thread Neil Madden
If we go down the 307 route, shouldn’t it rather be a 308 (permanent) redirect? It seems unnecessary for the client to keep trying the original endpoint or have to remember cache-control/expires timeouts. — Neil > On 2 Feb 2019, at 00:03, Richard Backman, Annabelle > wrote: > > Confusion fr