I had read the blog post and I think my proposal fits well with its intent.  It specifically says that scopes are not for the fine grained access control that Warren wants and that that should properly be the purview of the resource server.

While a quick look at RAR points to the fact that a specification would be beneficial, it also appears that support for RAR is lagging.  So until authorization servers, resource servers, and clients all support RAR, some kind of scope context is going to continue to be needed.

That kind of "universal" support in a decoupled ecosystem like e-mail, calendars, and contacts is going to take time.

So, while I agree expanding the scope of the draft to include standard RAR profiles is a good idea, I don't believe dropping the scopes would be a good idea at this time.  Doing so could easily hamstring widespread support of advanced authentication for these services for many years.

On 7/20/2025 04:01, Lombardo, Jeff wrote:

To add to Warren point, it is important to reup feu Vittorio Bertocci blog entry on the nature of OAuth2 scopes that cover exactly this use case: https://auth0.com/blog/on-the-nature-of-oauth2-scopes/

I think this proposal instead of building on top of the `scope` claim should pivot into profiling *OAuth 2.0 Rich Authorization Requests* (https://datatracker.ietf.org/doc/html/rfc9396)**

*Jean-François “Jeff” Lombardo*|Amazon Web Services

//

On Sun, Jul 20, 2025 at 08:19 AM Warren Parad <[email protected]> wrote

I have some serious problems with this document:

   - I fundamentally disagree about the scopes defined for mail, calendar,

   and contact. One of the biggest problems with the scopes today, is the lack

   of the scope "update/modify/delete BUT only the emails, contacts, and

   calendar meetings that the app has created". I don't want to give *access

   to delete all my calendars* just so an app can *create calendar

   appointments in one calendar*.

For me, scopes for calendar and contacts are already broken by design, and

this document actually makes it worse. Take the scope

*urn:ietf:params:oauth:scope:calendar:update:*

>  Grants permission to create, modify, and delete calendars and events on

> the user's behalf.

The creation, modification, and deletion of calendars must be completely

independent from the creation, modification, and deletion of calendars. And

most problematically, *as a user*, I would only want to give access to do

this one calendar at a time. Because of this we really need to define

resource based syntax inside of OAuth spec to replace the scopes.

In conclusion, this document only sets out to standardize the irresponsible

behavior of apps utilizing scopes today, cementing the current paradigm

rather than replacing it with something that actually works correctly.

Using OAuth scopes alone for this access, is the part that is wrong, not

that it isn't standardized. In some cases, an incremental approach might

help get to the perfect solution, but I don't see this document helping to

make that happen. If it does anything for me, this prevents forward

progress in preference of keeping exactly what we already have.

On Sun, Jul 20, 2025 at 7:42 AM Clinton Bunch <[email protected]> <mailto:&lt;[email protected]&gt;>

wrote:

> I submitted https://datatracker.ietf.org/doc/draft-bunch-groupware-scopes/ <https://datatracker.ietf.org/doc/draft-bunch-groupware-scopes/>

>

> This is a proposal of standard OAUTH2 scopes to support the loosely

> coupled world of mail, calendaring, and contacts servers and clients.

>

> The current state is that every Authorization Server defines their own

> scopes for these groupware services, leading client developers to hard

> code these scopes, which, in practicality, limits them to supporting

> OAUTH2 authentication for only a dozen or so providers big enough to

> strong arm them into it.

>

> This is the remaining barrier to wide spread deployment of OAUTH2

> authentication for groupware services.  The other half of the problem,

> Client Registration, is solved by RFC 7591, OAuth 2.0 Dynamic Client

> Registration Protocol.

>

> With these two pieces in place, Authorization Servers and clients can

> begin to implement this advanced authorization process.

>

> _______________________________________________

> OAuth mailing list -- [email protected] <mailto:[email protected]>

> To unsubscribe send an email to [email protected] 
<mailto:[email protected]>

>


_______________________________________________
OAuth mailing list [email protected]
To unsubscribe send an email [email protected]

_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to