At some point, the enterprise perspective changes to what has been called “cascading authorization servers” because both the RS and the RO each have separate AS.

Adrian

On Tue, Aug 21, 2018 at 7:46 AM Pedro Igor Silva <psilva@redhat.com> wrote:


On Fri, Aug 17, 2018 at 4:54 PM, Adrian Gropper <agropper@healthurl.com> wrote:


On Fri, Aug 17, 2018 at 8:46 AM, Pedro Igor Silva <psilva@redhat.com> wrote:


On Fri, Aug 17, 2018 at 1:34 AM, Eve Maler <eve@xmlgrrl.com> wrote:

<SNIP>

Fourth, Adrian, you bring up the challenges of client app trust, particularly in the context of a loosely coupled AS and RS (which UMA has done a lot of deep work around, but which is starting to creep into the OAuth WG's thinking a bit now too). If there were outputs from the meeting in DC that describe the requirements around warnings, can we take a look? It's a bit odd to say that it's the RS that doesn't trust the client app, given that the RS doesn't really have a relationship with the client; the AS does. (The AS is what issues and checks client credentials.)

Don't know about the requirements, but yeah, we can take a look :)

Agree that AS is the main authority. But I think RS can also decide whether or not a client is trustworthy. Even if backed by information from AS. For instance, what if RS only allow access from Client X if authentication level is Y ?

I see this as out-of-scope for UMA. UMA is a delegation protocol. The RS is free to implement any set of protocols including authentication of the requesting party but I cant't see how UMA can possibly cover the range of business and jurisdictional mandates that could impact an RS decision to override an authorization. That is a very deep ocean. I'm not sure UMA even covers the protocol for the RS to notify the AS that it has been overruled regardless of why.

I agree, Adrian. I'm mainly considering "enterprise UMA" use cases.
 

Adrian

--

Adrian Gropper MD

PROTECT YOUR FUTURE - RESTORE Health Privacy!
HELP us fight for the right to control personal health data.