Re: [OAUTH-WG] Corona Virus and Vancouver

2020-03-09 Thread n-sakimura
I probably will not be there in person unless the situation improves dramatically iPhoneから送信 2020/03/10 10:09、Sascha Preibisch のメール:  I will be there if it is not getting worse. But in any case I am in Vancouver. Regards, Sascha On Mon., Mar. 9, 2020, 11:35 Daniel Fett,

Re: [OAUTH-WG] JWT Secured Authorization Request (JAR) vs OIDC request object

2020-01-05 Thread n-sakimura
Up until -12 (Feb 13, 2017), it was using merge + JAR precedence if duplicated. As of -13 (Mar 30, 2017), it was changed that the server does not have to do the merge, at least for OAuth Authorization request parameters. It says nothing about other parameters. As of -14 (Jul 21, 2017), the

Re: [OAUTH-WG] Call for Adoption: OAuth 2.0 Pushed Authorization Requests

2019-12-17 Thread n-sakimura
+1 野村総合研究所 IT基盤技術戦略室 上席研究員 崎村夏彦 E: n-sakim...@nri.co.jp T: +81(90)60136276 - このメールには、本来の宛先の方のみに限定された機密情報が含まれている場合がございます。お心あたりのない場合は、送信者にご連絡のうえ、このメールを削除してくださいますようお願い申し上げます。 PLEASE READ:This e-mail is confidential and intended for the named

Re: [OAUTH-WG] WGLC for "OAuth 2.0 Security Best Current Practice"

2019-12-04 Thread n-sakimura
Sorry to chime in so late as well as I have not been able to follow up all the mail in the tread, so it may have come up before but just for the sake... 1) Spelling of "OpenID" "OpenID" is sometimes spelled "OpenID" and sometimes " OpenId". Please unify to "OpenID" as that is the official way

Re: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-jwsreq-19: (with DISCUSS and COMMENT)

2019-07-28 Thread n-sakimura
Brian, You are the expert on the particular IANA registries so I probably are missing something. I was thinking that registering JWT claims to OAuth registry is sufficient till seeing Ben’s comment, and I was tracking that it is being done by Mike as part of the errata process for OIDC Core.

[OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-jpop-05.txt

2019-07-22 Thread n-sakimura
Just refreshed the JPOP draft as it may be pertinent to both DPOP and access token JWT discussion. Nat Sakimura Nomura Research Institute PLEASE READ:This e-mail is confidential and intended for the named recipient only. If you are not an intended recipient, please notify the sender and delete

Re: [OAUTH-WG] Call for adoption: JWT Usage in OAuth2 Access Tokens

2019-04-10 Thread n-sakimura
+1 For that matter, explicit typing is good and I am a bit ambivalent on the use of `sub`. Also, I need to add the 4th consideration: Although the current privacy consideration is stating about the encryption, it is in relation to the end user exposure. In fact, the by-value access token

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-12-01 Thread n-sakimura
John Bradley > mailto:ve7...@ve7jtb.com>>: > > I am ok with that. > > On Wed, Nov 28, 2018, 8:03 PM Torsten Lodderstedt > mailto:tors...@lodderstedt.net> wrote: > > > Am 28.11.2018 um 23:50 schrieb n-sakimura > > mailto:n-sakim...@nri.co.jp>>: > > >

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-11-29 Thread n-sakimura
by William We look forward to seeing your feedback. kind regards, Torsten. > Am 29.11.2018 um 15:15 schrieb John Bradley > mailto:ve7...@ve7jtb.com>>: > > I am ok with that. > > On Wed, Nov 28, 2018, 8:03 PM Torsten Lodderstedt > mailto:tors...@lodderstedt.net&

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-11-28 Thread n-sakimura
ます。 PLEASE READ :This e-mail is confidential and intended for the named recipient only. If you are not an intended recipient, please notify the sender and delete this e-mail. 差出人: Torsten Lodderstedt 送信日時: 水曜日, 11月 28, 2018 11:38 午後 宛先: n-sakimura Cc: Dick Hardt

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-11-28 Thread n-sakimura
I would support 1) clearly defining Implicit as the flow that returns access token from the authorization endpoint ( some people confuses implicit as the flow that returns ID Token in the front channel) 2) Banning the returning of the access token that are not sender constrained from the

Re: [OAUTH-WG] [Openid-specs-ab] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-11-27 Thread n-sakimura
:50 PM n-sakimura mailto:n-sakim...@nri.co.jp>> wrote: Tom, It is good to hear that you will be there. I understand John will also be there. To your question, self-issued ID does not require a (semi-)permanent URL as the user’s identifier, as it is always “localhost”. The identifie

Re: [OAUTH-WG] [Openid-specs-ab] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-11-27 Thread n-sakimura
Tom, It is good to hear that you will be there. I understand John will also be there. To your question, self-issued ID does not require a (semi-)permanent URL as the user’s identifier, as it is always “localhost”. The identifier is derived as the hash of the public key that was generated by

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-11-27 Thread n-sakimura
I am not sure about it. There are no confidential implicit grant client that uses bearer token is correct, but if the token is sender constrained, it can act as a confidential client. Think of the case where an OP that is unreacheable directly from the client but only indirectly through the

Re: [OAUTH-WG] draft-parecki-oauth-browser-based-apps-00

2018-11-16 Thread n-sakimura
Good points. Also, while it may be off-topic, I do see values in implicit flows. In some cases, such as when the AS is inside the firewall or on a localhost (e.g., smartphone), “code flow” is not possible as the client cannot reach the AS directly. Banning implicit (and thus “token id_token”

Re: [OAUTH-WG] AS Discovery in Distributed Draft

2018-11-15 Thread n-sakimura
Hmmm. But the Link-header is the generalized discovery method which is pretty widely used outside of OAuth community with the added benefit of being able to find things without linking to authentication. From: OAuth On Behalf Of George Fletcher Sent: Friday, November 09, 2018 12:12 AM To: Dick

[OAUTH-WG] Fwd: New Version Notification for draft-ietf-oauth-jwsreq-17.txt

2018-10-21 Thread n-sakimura
Just updated a typo that was pointed out. BTW, the spec has not progressed for a long time. I wonder what can I do to push it through. Nat 差出人: internet-dra...@ietf.org 送信日時: 日曜日, 10月 21, 2018 11:17 午後 宛先: Nat Sakimura; John Bradley 件名: New Version Notification

Re: [OAUTH-WG] updated Distributed OAuth ID

2018-07-20 Thread n-sakimura
Hi David, Thanks for the comment, and sorry for the delay in my reply. Doing it with Web Linking [RFC8288] has several advantages. 1. It is standard based ☺ It is just a matter of registering link relations to the IANA Link Relation Type Registry, and it is quite widely used. 2. No or

Re: [OAUTH-WG] Call for adoption for "Distributed OAuth"

2018-07-20 Thread n-sakimura
And if it were not obvious, YES ☺ From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Dick Hardt Sent: Friday, July 20, 2018 6:12 AM To: Rifaat Shekh-Yusef Cc: oauth Subject: Re: [OAUTH-WG] Call for adoption for "Distributed OAuth" I'm supportive. :) On Thu, Jul 19, 2018 at 4:05 PM,

Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0"

2018-07-20 Thread n-sakimura
+1 From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Campbell Sent: Friday, July 20, 2018 7:42 AM To: Rifaat Shekh-Yusef Cc: oauth Subject: Re: [OAUTH-WG] Call for adoption for "Resource Indicators for OAuth 2.0" I support adoption of this document. On Thu, Jul 19, 2018 at 4:01

Re: [OAUTH-WG] Call for agenda items

2018-04-17 Thread n-sakimura
and delete this e-mail. 差出人: Dick Hardt <dick.ha...@gmail.com> 送信日時: 2018年4月18日 0:40:20 宛先: n-sakimura CC: Rifaat Shekh-Yusef; oauth 件名: Re: [OAUTH-WG] Call for agenda items ** 本メールはフリーメールから届いています

Re: [OAUTH-WG] Call for agenda items

2018-03-07 Thread n-sakimura
] Sent: Wednesday, March 07, 2018 9:22 PM To: n-sakimura <n-sakim...@nri.co.jp> Cc: Brian Campbell <bcampb...@pingidentity.com>; oauth <oauth@ietf.org> Subject: Re: [OAUTH-WG] Call for agenda items Nat, Are you asking for an interim meeting? We could schedule the Distribute

Re: [OAUTH-WG] Call for agenda items

2018-03-06 Thread n-sakimura
Then let us do it. We need to put all the proposals on the table and strategize the design. Perhaps we need a side meeting as well. nat From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Campbell Sent: Wednesday, March 07, 2018 1:31 AM To: Rifaat Shekh-Yusef

[OAUTH-WG] FW: Call for Participation - Third OAuth Security Workshop (OSW 2018)

2018-03-05 Thread n-sakimura
FYI. It is on the week before the IETF 101 London. Bunch of us are going to be there discussing security aspect of OAuth. Nat -Original Message- From: Roberto Carbone Sent: Tuesday, March 06, 2018 3:07 AM Subject: Call for Participation - Third OAuth Security Workshop (OSW 2018)

Re: [OAUTH-WG] FW: New Version Notification for draft-ietf-oauth-jwsreq-15.txt

2018-02-09 Thread n-sakimura
Right. It has been hanging there since July... Nat -Original Message- From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Vladimir Dzhuvinov Sent: Friday, February 09, 2018 5:03 PM To: oauth@ietf.org Subject: Re: [OAUTH-WG] FW: New Version Notification for