Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Should our token introspection object permissions structure be a MUST now? #322

Closed
xmlgrrl opened this issue May 18, 2017 · 1 comment
Closed
Labels
fedauthz Related to UMA2 Federated Authorization V2.0

Comments

@xmlgrrl
Copy link

xmlgrrl commented May 18, 2017

In FedAuthz Sec 5.1.1, @jricher suggests:

"why is "permissions" not a MUST? if it's an UMA token it'll have it, if it's not, it won't. the hand-wave to an extension feels weird here. an extension could just as easily say "our kind of tokens don't use that object" and so responses won't conform to the base spec but to the extension instead. just like a plain oauth token instead of an uma token."

The specific language in question:

"If the introspection object's active parameter has a Boolean value of true, then the object MUST NOT contain a scope parameter, and SHOULD contain an extension parameter named permissions that contains an array of objects, each one (representing a single permission) containing these parameters:"

@xmlgrrl xmlgrrl added fedauthz Related to UMA2 Federated Authorization V2.0 labels May 18, 2017
@xmlgrrl xmlgrrl changed the title Should our token introspection object structure be a MUST now? Should our token introspection object permissions structure be a MUST now? May 18, 2017
@xmlgrrl
Copy link
Author

xmlgrrl commented May 18, 2017

Per UMA telecon 2017-05-18: We made a strong decision to make permissions be a SHOULD for extensibility reasons, in case someone wanted to experiment with the dividing line between AS and RS responsibilities. However, token introspection is already optional in OAuth, and with the spec refactoring, maybe this isn't necessary anymore. And changing from a SHOULD to a MUST is backwards incompatible, whereas the reverse isn't (it would break implementations to change it in this direction). Consensus to change to a MUST.

xmlgrrl added a commit that referenced this issue May 21, 2017
Also removed the interop/profiling health warning.
@xmlgrrl xmlgrrl closed this as completed May 25, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
fedauthz Related to UMA2 Federated Authorization V2.0
Projects
None yet
Development

No branches or pull requests

1 participant