-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Framing in terms of GNAP #80
Comments
The flow that starts at the resource server could be called a "RS-first" flow, as opposed to a "client-first" flow. |
Let me reference the doc you mentioned when we discussed this: |
So we can build on https://github.com/pondersource/surf-token-based-access - in particular I designed the client-facing scope info structure with the So the reasoning would be as follows, starting from standard OAuth Client Credentials Flow:
|
I think that basically completes the framing! Will try to discuss it with the OAuth experts at OSW this week. |
I think a small step to make would be to remove The simple scenario is where the receiving server is already an API client of the sending server. |
The main change to our protocol would be #98 |
I'll re-read https://datatracker.ietf.org/doc/draft-ietf-gnap-core-protocol/ and see what OCM would add to GNAP. |
I think there are three sides to OCM that we could develop as separate GNAP extensions:
|
The first two would also be quite valuable on their own for Fediverse and Solid probably. The third one would also be quite valuable on its own in classic OAuth situations, for instance, GitHub could ping an ecosystem app like a CI or deployment system to notify of the existence of a newly created repo to which the app already has access with its existing API token, or for which it is invited to request access. |
Maybe we can adopt server-to-server signatures like https://www.w3.org/wiki/ActivityPub/Primer/Authentication_Authorization and #92 |
Done, see #98 (comment) |
We could inherit a lot of best practices if we could somehow fit OCM into OAuth.
The flow is entirely different from classic OAuth, but maybe not that different from UMA.
When the resource owner picks a "sharee" (user@host), they are basically picking both a requesting party (user) and a client (host).
The text was updated successfully, but these errors were encountered: