> (please move the rest of this conversation over to OAuth WRAP WG!)
(CC'ing both groups until George joins oauth-wrap-wg)
> In other profiles, we have the refresh token precisely so the user doesn't have to be involved every time the access token expires.
I don't expect the SAML profile to be used very often when a human
being is involved. If we've got SAML and a user in the picture, we're
almost certainly using the web SSO profile of SAML. Note that in that
case the client *never sees* the SAML assertion. All they know is
that they popped open a web browser to get user approval.
I do expect the SAML profile to be used in cases where no human being
is present, e.g. a cron job. For example:
- cron job wakes up, needs access to data
- local authentication context (e.g. kerberos, unix session, role
account password, IP address, ssh keys, or other magic security dust)
is used to talk to a SAML IdP
- SAML IdP returns a SAML authentication message
- SAML authentication message is swapped for an access token.
So no refresh token is needed; the ability to get long-lived access to
user data is provided by the local authentication context.
Cheers,
Brian