Re: [OAUTH-WG] Token introspection for public clients?

2015-07-26 Thread Aaron Parecki
Okay, I understand more of the intent of this document now. I will say that the first time I read it, it was not at all clear that it was not intended for OAuth 2.0 clients to use this endpoint. It seems now that it is only intended for internal servers to use, such as when a resource server is

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-22 Thread Sergey Beryozkin
Hi Would there be any sense at all to have a new endpoint dedicated to supporting public clients only for these clients be able to do the extra validation which only public clients may need, etc, etc. Or perhaps let the access token endpoint not only exchange grants but also do some optional

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-21 Thread Justin Richer
Just use the token at your target API and see if it works. Your client’s going to need to be able to get a new token if this one expires mid-session anyway, so you’re not saving anything by doing an introspection request. — Justin On Jul 20, 2015, at 9:34 PM, Aaron Parecki aa...@parecki.com

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Phil Hunt
Why does your client need/want to read the token? Phil @independentid www.independentid.com phil.h...@oracle.com On Jul 20, 2015, at 9:34 AM, William Denniss wdenn...@google.com wrote: Even if the primary target is the protected resource, is there a reason to exclude use by clients?

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Phil Hunt
Apologies, I did not mean read, but introspect the token. Phil @independentid www.independentid.com phil.h...@oracle.com On Jul 20, 2015, at 9:38 AM, Phil Hunt phil.h...@oracle.com wrote: Why does your client need/want to read the token? Phil @independentid www.independentid.com

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Justin Richer
In OAuth, the token is opaque to the client. Clients in general don’t need to know the kinds of token information that’s returned from the introspection endpoint. Clients already get information about scopes and expiration from the token endpoint, what else do they need? If they need more

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Sergey Beryozkin
Hi, I've always thought OAuth2 clients are out of the picture here, except that the resource server needs to introspect a client's token and it (the resource server) needs to authenticate to the introspection endpoint. Letting the actual OAuth2 clients (confidential or public ones) also

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Brian Campbell
Any good access token implementation should make such scanning totally infeasible (via sufficient entropy in the token, if it's a reference, or cryptographic protections, if it's self contained). Authentication/authorization at the introspection endpoint, in my view anyway, is more about privacy

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Aaron Parecki
Okay, if the intent is for this endpoint to be used by the resource server, this all makes sense. I was under the impression that it could also be used by clients to verify if the token is valid. Is there some other spec I could look at that is intended to be used by clients to verify if a token

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread John Bradley
You get the AT validity period with the token expires_in. The Refresh token doesn't expire. A token could be revoked in less than the expiry time but you discover that by using it. If you get a error on the API using the AT then you make the user re authorize you via the Authorization

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread Aaron Parecki
I'm looking for a way to check if an existing token is still valid. Imagine a client is holding on to a token between user sessions, for example if it's making API requests for the user on a cron job. When the user returns to the site, I want to check if the token is still valid, and make them

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-20 Thread John Bradley
If you want the resource owner/user then get a id_token from the token endpoint. That saves another call to a introspection endpoint. Sent from my iPhone On Jul 20, 2015, at 7:49 PM, Aaron Parecki aa...@parecki.com wrote: Okay, if the intent is for this endpoint to be used by the

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-19 Thread John Bradley
?) Cheers, -- Mike From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Aaron Parecki Sent: Sunday, July 19, 2015 6:31 AM To: OAuth WG Subject: [OAUTH-WG] Token introspection for public clients? The introspection draft

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-19 Thread Aaron Parecki
How are public clients supposed to authenticate if there is no secret? Isn't fishing for valid tokens just as much of an issue at the resource server? I don't see how having the introspection endpoint require client authentication actually solves the fishing problem since attackers could just

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-19 Thread Justin Richer
In the case of a “public client” using a token, the authorization is the token that the resource server uses to call the introspection endpoint, along side the token that it is introspecting. This is exactly how the UMA protocol works: the resource server has a “Protection API Token” that it

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-19 Thread Justin Richer
Because the target isn’t the client, it’s the protected resource. We’re re-using OAuth’s client credentialing mechanisms (optionally, you can use whatever you deem necessary), but it’s not a client that’s doing it. That’s why it was changed to a MUST — there may be public clients out there

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-19 Thread Dominick Baier
I totally agree with that - and that’s how we gonna implement it in identity server. We are planning to introduce something called a “scope secret” - it’s like a client secret but for resources. —  cheers Dominick Baier On 20 Jul 2015 at 07:01:48, Justin Richer (jric...@mit.edu) wrote:

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-18 Thread Justin Richer
Public clients can use the token-based auth mechanism, can’t they? If you don’t have some form of authentication on the introspection endpoint, you end up with a way for people to anonymously and programmatically fish for valid token values. — Justin On Jul 19, 2015, at 6:30 AM, Aaron