1 / 11

A SASL and GSS-API Mechanism for OAuth draft-ietf-kitten-sasl-oauth-00

A SASL and GSS-API Mechanism for OAuth draft-ietf-kitten-sasl-oauth-00. William Mills Tim Showalter Hannes Tschofenig. J. F. M. A. M. J. J. A. S. O. N. D. 2010. J. F. M. A. M. J. J. A. S. O. N. D. 2011. Status. Indiv- 04. Indiv- 03. Indiv-02. Indiv-01. Indiv-00.

tirza
Download Presentation

A SASL and GSS-API Mechanism for OAuth draft-ietf-kitten-sasl-oauth-00

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A SASL and GSS-API Mechanism for OAuthdraft-ietf-kitten-sasl-oauth-00 William Mills Tim Showalter Hannes Tschofenig

  2. J F M A M J J A S O N D 2010 J F M A M J J A S O N D 2011 Status Indiv-04 Indiv-03 Indiv-02 Indiv-01 Indiv-00 IETF#82 IETF#80 IETF#81 draft-mills-kitten-sasl-oauth IETF#79 IETF#78 draft-ietf-kitten-sasl-oauth WG item -00

  3. Status, cont. • draft-ietf-kitten-sasl-oauth-00.txt submitted as WG item this Monday. • Content of draft-mills-kitten-sasl-oauth-04 and draft-ietf-kitten-sasl-oauth-00.txt identical! • -04 version saw a number of changes: • Abstract and Introduction modified • Sections restructured. • References updated • Editorial bugfix

  4. Reminder: Architecture ----+ +--------+ +---------------+ | | |--(A)-- Authorization Request --->| Resource | | | | | Owner | |Plain | |<-(B)------ Access Grant ---------| | |OAuth | | +---------------+ |2.0 | | | | | Client Credentials & +---------------+ | | |--(C)------ Access Grant -------->| Authorization | | | Client | | Server | | | |<-(D)------ Access Token ---------| | | | | (w/ Optional Refresh Token) +---------------+ | | | ----+ | | | | ----+ | | (Optional discovery) +---------------+ | | |--(1)------- User Name --------->| | | | Client | | | | | |<-(2)------ Authentication -------| | | | | endpoint information | Resource | |OAuth | | | Server | |over | |--(E)------ Access Token -------->| | |SASL/ | | | | |GSS- | |<-(F)---- Protected Resource -----| | |API +--------+ +---------------+ | ----+

  5. Design Decisions • (1) OAuth Integration into SASL • HTTP-Style • Native • (2) Security Functionality Scope • Bearer Token Support • MAC security • Public Key security • (3) Discovery • Part of OAuth SASL specification • Independent mechanism

  6. OAuth Integration into SASL(a) HTTP-based Style GET / HTTP/1.1 Host: server.example.com User: user@example.com Authorization: MAC token="h480djs93hd8", timestamp="137131200”, nonce="dj83hs9s", signature="YTVjyNSujYs1WsDurFnvFi4JK6o=" • GET / HTTP/1.1 • Host: imap.example.com • Authorization: BEARER "vF9dft4qmTc2Nvb3RlckBhbHRhdmlzdGEuY29tCg=="

  7. OAuth Integration into SASL(b) Native • TOKEN="vF9dft4qmTc2Nvb3RlckBhbHRhdmlzdGEuY29tCg==",SCOPE="foo"

  8. OAuth Integration into SASL • HTTP-Style • Re-uses HTTP parsing library, re-uses Oauth specifications as much as possible, similar to tunneling request/responses defined in draft-ietf-kitten-sasl-saml-05 and in draft-ietf-kitten-sasl-saml-ec-00.txt • Native • Requires more specification work to decide about defining request and response (including error parameters). • May require less code.

  9. Security Functionality Scope • OAuth WG develops two HTTP-based security variants: • Bearer Token: http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/ • MAC Token:http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac • Other options: RFC 5849 (RSA signature method) or draft-balfanz-tls-obc-00 - TLS Origin-Bound Certificates • What security mechanisms should be specified?

  10. Discovery • Certain OAuth profiles do not require OAuth support by the end host. • Impacts design of discovery mechanism. • Proposals for discovery being discussed in the OAuth WG. E.g., draft-jones-simple-web-discovery. • OAuth SASL is in a different position since end host changes are needed anyway. • A discovery mechanism could be incorporated into OAuth SASL.

  11. Discovery, cont. • { • "authorization_endpoint": "https://example.com/connect/authorize", • "issuer" : "https://example.com", • "token_endpoint": "https://example.com/connect/token" • "user_info_endpoint": "https://example.com/connect/user", • "check_id_endpoint": "https://example.com/connect/check_id", • "refresh_session_endpoint": "https://example.com/connect/refresh_session", • "end_session_endpoint": "https://example.com/connect/end_session", • "jwk_document": "https://example.com/jwk.json", • "registration_endpoint": "https://example.com/connect/register", • "scopes_supported": ["openid"], • "flows_supported": ["code", "token"], • "iso29115_supported": ["http://www.idmanagement.gov/schema/2009/05/icam/openid-trust-level1.pdf"], • "identifiers_supported": ["public", "ppid"] • } Example from http://openid.net/specs/openid-connect-discovery-1_0.html

More Related