-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decide on header/mechanism for reporting auth metadata for a Solid pod (RS) #4
Comments
The consensus from the 2019-10-21 Authentication panel meeting was:
|
I think the question still remains (which I forgot to bring up in the meeting): Which attribute of the Currently, Node Solid Server is using the Are folks ok continuing to use that attribute? |
Well according to the Mozilla document on WWW-Authenticate,
you use the type to specify the types of authentication methods allowed. They list an IANA registry of those. My guess is that if the server wants to offer a number of different methods, it should send a number of |
is improper, because it has nothing to do with OAuth2-style bearer tokens. a different
if we're going to document deprecated legacy behavior that was deployed, putting the while we're at it, i've always had a problem with using the
|
@zenomt All good points. The |
DPoP draft intends to register DPoP token type for Bearer authentication scheme
Also in Justin's book I've noticed use of PoP
Not sure how those two registries supposed to work together
If we use authentication scheme in |
@elf-pavlik Ahhh yeah, ok, you're right, the DPoP draft spec does specify using 'DPoP' as the Authentication scheme. So then we'll use as a response header:
to indicate that the RS supports the DPoP presentation mechanism. |
As both the authentication and authorization/acl systems for Solid evolve, it would be helpful to standardize on (and document) some way to inform clients as to which system (and spec version) a particular storage pod (Resource Server, in oauth2 terms) is running.
For example, currently, we use the
scope
param of theWWW-Authenticate
response header, to helpsolid-auth-client
figure out which auth mode a Solid server is running in (WebID-TLS-only, or WebID-OIDC).So, for node-solid-servers running in WebID-OIDC mode, on a 401 Unauthorized response, the server returns the following header:
WWW-Authenticate: Bearer realm="<pod serverUrl>", scope="openid webid"
The scope maps to, roughly:
openid webid
=== WebID-OIDC modetls webid
=== legacy WebID-TLS-only mode(This was included to help solid-auth-client decide on how to interface with the server).
So, we have several questions before us:
WWW-Authenticate
response header, so if we continue going with that, what should the parameter be?)The(The authorization mechanism does not need to be communicated.)WWW-Authenticate
header spec tends to conflate authentication and authorization mechanisms into one -- how do we separate the two?The text was updated successfully, but these errors were encountered: