Skip to content

Commit 8cce1d2

Browse files
allow Kerberos, fix #38, fix #39
1 parent 060d309 commit 8cce1d2

File tree

3 files changed

+24
-9
lines changed

3 files changed

+24
-9
lines changed

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010

1111
## Breaking for clients:
1212
* Servers MAY now expire access tokens, in line with the OAuth spec.
13+
* Servers MAY now use Kerberos instead of OAuth.
1314

1415
## non-breaking:
1516
* The option to offer a manual way to create access tokens is now mentioned

draft-dejong-remotestorage-03.txt

1.33 KB
Binary file not shown.

source.txt

Lines changed: 23 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -369,9 +369,10 @@ Table of Contents
369369

370370
As a special exceptions, GET requests to a document (but not a
371371
folder) whose path starts with '/public/' are always allowed. They,
372-
as well as OPTIONS requests, can be made without a bearer token. All
373-
other requests should present a bearer token with sufficient access
374-
scope, using a header of the following form (no double quotes here):
372+
as well as OPTIONS requests, can be made without a bearer token.
373+
Unless [KERBEROS] is used (see section 10 below), all other requests
374+
SHOULD present a bearer token with sufficient access scope, using a
375+
header of the following form (no double quotes here):
375376

376377
Authorization: Bearer <access_token>
377378

@@ -398,11 +399,21 @@ Table of Contents
398399
}
399400

400401
Here <storage_root> and <storage_api> are as per "Session
401-
description" above, and <auth-dialog> SHOULD be a URL where an
402-
OAuth 2.0 implicit-grant flow dialog [OAUTH] is presented, so the
403-
user can supply their credentials (how, is out of scope), and allow
404-
or reject a request by the connecting application to obtain a bearer
405-
token for a certain list of access scopes.
402+
description" above, and <auth-dialog> SHOULD be eihter the boolean
403+
value false or a URL where an OAuth 2.0 implicit-grant flow dialog
404+
[OAUTH] is presented.
405+
406+
If <auth-dialog> is a URL, the user can supply their credentials
407+
there (how, is out of scope), and allow or reject a request by the
408+
connecting application to obtain a bearer token for a certain list
409+
of access scopes.
410+
411+
If <auth-dialog> is false, the client will not have a way to obtain
412+
an access token, and SHOULD send all requests without Authorization
413+
header, and rely on Kerberos [KERBEROS] instead for requests that
414+
would normally be sent with a bearer token, but servers SHOULD NOT
415+
impose any such access barriers for resources that would normally
416+
not require an access token.
406417

407418
The <query-param> variable SHOULD have the boolean value true if
408419
the server supports passing the bearer token in the URI query
@@ -834,7 +845,10 @@ ge.io/spec/modules/myfavoritedrinks/drink"}
834845
Bearer Token Usage", RFC6750,
835846
http://tools.ietf.org/html/rfc6750#section-2.3, October 2012.
836847

837-
848+
[KERBEROS]
849+
C. Neuman et al., "The Kerberos Network Authentication Service
850+
(V5)", RFC4120,
851+
https://tools.ietf.org/html/rfc4120
838852

839853
18. Authors' addresses
840854

0 commit comments

Comments
 (0)