-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Recommended OAuth2 flows #5
Comments
Generally we need to better integrate OAuth2 into the rest of the document. Right now it just pops up in a subsection... a HUGE subsection which is longer than the rest of the document. Perhaps we can move some of the material to an appendix and focus in the main text just on the recommendations (use only "code" and "client", and "device"). |
Let's do the following:
|
See also #11, which is about fixing the conformance section. Both these issues should be resolved together. |
See PR to update OAuth2 examples in TD spec and my review:. After some thought, I think we should recommend use of the "client" flow for most usages, since it enables M2M interactions, needed for orchestration. Code and device both require user interaction. AFAIK even usage of an interaction directly from a browser can still use the client flow, so... (Edit: wrong. See below. Client cannot be used with browsers...) I think we should:
I was originally thinking we could use "device" and "code" for onboarding but since they don't support delegation I'm not sure they are completely appropriate. Maybe as part of a bootstrapping process to establish other credentials? At any rate I'm not sure we want to recommend them for "normal" interactions. |
I would support having
In our context, this translates to interactions between a set of web things that belongs to the same "product family" (for example a companion application for orchestrating devices of a particular brand). It may have other applications but this is the one that I wrote a while ago in the oAuth 2.0 use cases (now adapted in the new WoT security best practices). On the other hand, I don't think |
|
@mmccool to create a PR for the above consensus, in the wot-security-best-practices document |
Review also w3c/wot-scripting-api#214 |
Since "implicit" and "password" are deprecated in OAuth2, we should add a recommendation that only "code" and "client" should be used, and also "device" (assuming it gets added in TD1.1).
See w3c/wot-security#194
The text was updated successfully, but these errors were encountered: