[Openid-specs-ab] Session
John Bradley
ve7jtb at ve7jtb.com
Wed Apr 13 18:12:59 UTC 2011
To summarize, so that I have it strait.
So in the main flow you get a access token.
You use the access token to get the signed ID token from the get_id_token endpoint.
For 3 rd parties where they may not have access to the symmetric secret, or particularly lazy clients who don't want to support base64 decoding etc there is a check_id_token endpoint (direct) that returns a unsigned JWT.
There is a renew_id_token endpoint via redirect.
You say
There’s no UI at this endpoint -- however, immediate mode can be used to suppress login page, which otherwise will be shown when user is not signed-in.
Perhaps the immediate mode reference is old? From when we were talking about re-using the authorization endpoint.
In the JWT token we should also include a nonce to prevent replay types of attacks.
Towards the end you indicate that the id_token may come directly from the token endpoint along with the access token.
Which id_tokens are usable for session synchronization purposes and which are not? To keep things simple for clients, if the client obtains an id_token either by:
- Redeeming a code, always obtained via indirect communication through the browser;
- Supplying an access_token to the get_id_token endpoint where the access_token was obtained via indirect communication through the browser;
I am not against returning the ID_token from athe token endpoint directly, but I thought that you wanted it to be a separate call.
John B.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20110413/bc66d07b/attachment.html>
More information about the Openid-specs-ab
mailing list