Native application SSO Working Group

Paul Madsen paulmadsen at rogers.com
Tue Jul 2 12:38:34 UTC 2013


Hi Torsten, the current model is that the Authorization Agent (AZA) may 
itself obtain an id_token and use it to obtain an access token, but that 
only access tokens would be 'handed over' by the AZA to its constituent 
native apps.

Are you proposing that there may be value in allowing the AZA to also 
hand over id_tokens (suitably targeted) as well?

paul

On 7/1/13 1:38 PM, Torsten Lodderstedt wrote:
> Hi John,
>
> I interpreted the text of the charter the other way around, so a 
> client would be able to use an(y) id_token (as a credential) to obtain 
> an access token. I'm fine if the mechanism is intended to support 
> id_token issuance.
>
> regards,
> Torsten.
>
>  Am 01.07.2013 15:06, schrieb John Bradley:
>> Hi Torsten,
>>
>> In point 3 the charter talks about using id_tokens to get access tokens.
>>
>> So it is imagined that the mechanism would issue id_tokens likely 
>> along the lines that Google is doing for the play store by having a 
>> 3rd party as an audience and using "azp" to indicate the client the 
>> token was issued to.   We don't want to be too specific on the 
>> solution in the charter.
>>
>> If you think something needs to be added let me know.
>>
>> John B.
>>
>> On 2013-07-01, at 2:17 AM, Torsten Lodderstedt 
>> <torsten at lodderstedt.net <mailto:torsten at lodderstedt.net>> wrote:
>>
>>> Hi,
>>>
>>> it would be great to have such a mechanism across platforms!
>>>
>>> I'm wondering whether the mechanism should issue id tokens as well. 
>>> Right now it seems to focus on access tokens.
>>>
>>> Regards,
>>> Torsten.
>>>
>>>
>>>
>>> John Bradley <ve7jtb at ve7jtb.com <mailto:ve7jtb at ve7jtb.com>> schrieb:
>>>
>>>     The enclosed Work Group Charter is being sent to the Specs Council for review in anticipation of chartering the Group.
>>>
>>>     It is best have this activity under the foundation IPR as soon as possible.
>>>
>>>     Regards
>>>     John B.
>>>
>>>
>>>
>>>     ------------------------------------------------------------------------
>>>
>>>     specs mailing list
>>>     specs at lists.openid.net  <mailto:specs at lists.openid.net>
>>>     http://lists.openid.net/mailman/listinfo/openid-specs
>>>
>>
>
>
>
> _______________________________________________
> specs mailing list
> specs at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs/attachments/20130702/41d7eceb/attachment.html>


More information about the specs mailing list