I don't think that's really enough - Facebook can change its implementation (rightly so) whenever it likes or even do something totally different. It's defn a good starting point for people now - but the you'll suddenly be into version numbers of facebooks take in openauth. They might be fine with it but its very fragile.
There needs to be a forum / consensus / maintenance mechanism.
Another post on the topic:
http://blogs.mnt.se/the-bitter-taste-of-good-intentions/
Simply put, the enterprises needed a framework and the web needs a spec.
Simply put, the enterprises needed a framework and the web needs a spec.
One thing Eran said in a comment[1] on his first post was that he thought maybe the best approach is for someone or a group of someones to "just do it" on GitHub. I rather like that as a good potential solution.
All the hard fought compromises on the mailing list, in meetings, in special design committees, and in back channels resulted in a SPECIFICATION that fails to deliver its two main goals – security and interoperability. In fact, ONE OF THE COMPROMISES WAS TO RENAME IT FROM A PROTOCOL TO A FRAMEWORK, and another to add a disclaimer that warns that the specification is unlike to produce interoperable implementations.
This seems like a good insight. Might it be that the web devs place a higher value on interop, or is that reading too much into it? My impression seems to be that seamless interop was sacrificed pretty early on by all parties.
Yes. I'd like to see open-source client code that supports "Web Auth" and know that I can point it at any "Web Auth" provider and "have it just work." Can't do that with oAuth 2.0.
I like this idea too - but I still think you need a "body" even if it's a bunch of people that meet over beer - because requirements change over time, security issues happen, different languages need implementations etc. So if there's no forum of somekind, there's no legitimacy.
Agreed, but I think the idea is that it starts on GitHub, gets lots of traction because it solves a well-defined problem that is sorely needed, and *then* the standardization body gets ahold of it. So success comes before standardization as vice-versa doesn't seem as likely.
I think this is a good characterization - the enterprise / web "labels" might trouble some since as you pointed out - enterprises want their APIs to be easy to use as well. I think the distinction is really:
To be clear I hope what I said in attempt to interpret Eran wasn't read to mean "An enterprise solution needs to be difficult to use!" Clearly no, that's orthogonal; it doesn't need to be prescriptive and it needs to be flexible, which by nature often makes it less easy-to-use.More importantly, the web needs prescriptive and not flexible as well as easy-to-use but just as importantly it needs to be relatively easy to implement the *complete* spec, not just portions of.
- In what scenarios do you have latitude to ask your API users to write custom code (or are you connecting to custom code already there): thisimplies a level of leverage or at least direct communication. [which often happens in enterprise scenarios]- In what scenarios do you not have this leverage. [which often happens in open web deployments.]If you are hoping for wide adoption by people as yet unknown to you want the spec you hang your hat on to be as nailed down as possible because people will have seen it before, written libraries etc.
Exactly.
I think the call to fork is a bit premature.
Maybe instead of a fork, a "web auth subset."
Now that the dust has settled, I think it’s clear that OAuth 2.0 is moving forward. I agree with Rob, I don’t get why this was such a big deal. At worst, Eran’s drama suggests the OAuth spec team is dysfunctional but the spec itself serves its purpose just fine. What is needed is a handshake protocol to issue a token that is later used to consume an API and OAuth 2.0 provides a great basis for this.
OAuth 2.0 is focused on the handshake protocol and leaves other parts of an authentication process open to the implementer. This flexibility makes OAuth more relevant in the enterprise. I happen to be involved with implementing API access control in many enterprise settings today and although OAuth 2.0 is central to most of these implementations, enterprise architects are well aware that secure access control requires a lot more than a handshake protocol. As part of these implementations, OAuth is being combined with strong authentication, with multi-factor authentication, with enterprise SSO, etc. OAuth is also being combined with XACML, with SAML, and other standards.
We happen to be discussing OAuth on tomorrow’s tech talk. We want to hear why and how you are moving fwd with OAuth (or not). Join us Aug 7 9am PST at facebook.com/layer7.
-fl