[Openid-specs-ab] openid connect specs review
Nat Sakimura
sakimura at gmail.com
Fri Jul 8 00:11:38 UTC 2011
This is a note that records the decisions made at July 7 Spec Call.
This for the HTTP Redirect Binding.
On Thu, Jul 7, 2011 at 9:29 AM, Johnny Bufu <jbufu at janrain.com> wrote:
> Hello spec editors,
>
> I've given a close read to the following specifications. Below are comments
> about parts that I've found unclear or confusing, and questions for which I
> didn't find answers in the specs and would hold me back if I were to
> implement them.
>
> Thanks,
> Johnny
>
>
> ------------------------------**------------------------------**----
>
> HTTP Redirect Binding (draft 01 / June 30, 2011):
>
> 3.1. Authorization Code Flow
>
> "the party that receives message MUST verify it according to the
> verification rule set in OpenID Connect Core 1.0 [OpenID.CC] and OpenID
> Connect Framework 1.0 [OpenID.CF]."
>
> There are no rules defined in Core.
>
>
Language in the Framework is not clear around id_token response. Clarify.
Probably needs id_token be in the core, because id_token is required to make
the core work. Talk to Breno.
> 3.1.1.1. Query Parameters Method
>
> Which HTTP methods are allowed? Being a HTTP binding profile I would
> expect, as an implementer, to find this answer here.
>
Define methods for each endpoints. Edmund.
>
> 3.1.1.1.1. Client sends a request to the Authorization Server
>
> "any other valid means of directing the User-Agent to the URL" is ambiguous
> and open-ended, a HTTP binding specification should define what's
> acceptable.
>
Delete valid. Edmund.
>
> scope: "openid" is missing from example.
>
Add it.
>
> 3.1.1.2. Request Parameter Method
>
> "The JWT object MAY be signed or signed and encrypted via JWS [JWS] and JWE
> [JWE] respectively, thereby providing non-repudiation and/or security of the
> request."
>
> Non-repudiation is only one of the main benefits provided by signatures,
> while "security" is a too-generic term. I would suggest:
> "providing authentication, integrity, non-repudiation and/or
> confidentiality"
>
Accept.
>
> And again, the allowed HTTP methods should be specified.
>
As above.
>
> The second example should be replaced with the actual JWT (as the comment
> there says).
>
Add footnote.
>
> 3.2.5.1. End-User Grants Authorization
>
> Core defines only code, token, none as acceptable response_type values,
> which would suggest that id_token would then be unacceptable. (See also note
> on Core/Section 3.1.1)
>
> Also, I couldn't find where "id_token" is listed as possible/acceptable
> value for the response_type parameter, and what its meaning would be.
>
>
As above.
--
Nat Sakimura (=nat)
http://www.sakimura.org/en/
http://twitter.com/_nat_en
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20110708/ed6ef65f/attachment.html>
More information about the Openid-specs-ab
mailing list