[sldev] [AWG] OGP Authentication Draft 3

Escort DeFarge escort.defarge at gmail.com
Wed Jan 14 15:34:04 PST 2009


Food for thought indeed.

I guess my take was that OAuth could equally well start the chain of 
capability from an (at least partially standardized) http login. I 
hadn't really expected it to generalize out to object-level perms ...and 
it was my understanding that even Open ID relies on a TTP.

Thanks for the reply.

/esc


Meadhbh Hamrick (Infinity) wrote:
> but seriously. OAuth is a step in the right direction, but...
>
> a. it depends on HTTP. we think linking application level objects 
> (like application object access control metadata) with a specific 
> transport is a bad idea.
> b. as far as i can tell, it doesn't have a resource for managing 
> distributed access-control tokens. there seems to be an assumption 
> that all access control will be managed by the same administrative 
> party. that being said... there appears to be nothing in the spec to 
> PREVENT you from adding this feature, and I've pinged the OAuth peeps 
> from time to time about it, so who knows.
> c. OAuth is for securely transporting object access control metadata, 
> OGP Authentication is for authenticating an end user to a service 
> cloud. OGP Auth is actually a little closer to OpenID than to OAuth. 
> But i think you're asking... why not return an OAuth compliant PDU as 
> a result of successful OGP Authentication. hmm... no reason it can't 
> be done from a protocol perspective, but we would have to get with the 
> OAuth people and get them to fix problems a and b above before we 
> would likely deploy something like that.
>
> -cheers
> -meadhbh


More information about the SLDev mailing list