The OAuth 2.0 draft specification is out there. The efforts of the group working on the specification are paying off in the form of an IETF working group submission. One thing is clear, there is a natural tension in following the processes of IETF and the hyper-innovation cycle of web standards that are now powered by the growth of social media.
In this world, keeping up with all the work in the community itself is a feat in itself. As proven recently, even aligning the naming of standards in our small community (xAuth, XAuth) proves challenging enough. With that said, we’ll share we what we’ve learned about this version and what work has been incorporated into it.
For those coming up to speed on the issues surrounding OAuth 2.0, here is a brief summary of the state of the union:
The OAuth Working Group in IETF generated a first draft of OAuth 2.0. This group that is credited with this document consists of active leaders of both the Twitter API team as well as Facebook community standards team. A robust number of daily discussions are happening in the working group hosted at IETF include topics such as the default use of JSON that show the opportunity and challenge of growing the standard from a web-based to a broader set of devices and scenarios.
One of the stated goals of the IETF OAuth working group is to maintain backwards compatibility with OAuth 1.0. From our sampling of the depth of change in scope and conceptualization of the standard, this may be a big deal for the group, especially if key members decide to legacy their support for the first versions.
David Recordon, a chief thought leader in the open web (also employee at Facebook) recently offered this summary “What’s going on with OAuth?” to help align the understanding of the evolution of the standard.
Here we show one of the better known descriptions of the OAuth flow as provided by Yahoo. The annotations show a few of the areas that are under consideration for changes in OAuth 2.0 and/or in the work done in the OAuth WRAP group.
Last week, at Twitter’s Chirp ’10 the Twitter API team gave this presentation, “Too many secrets, but never enough: OAuth at Twitter“. This document contains overview of the basic process of Twitter, commitment to the movement to OAuth 2.0, and discussion of Twitter’s xAuth and OAuth Echos projects.
Twitter Likes to Optimize
Twitter is deeply intertwined with the inception and direction of OAuth. The company is both involved in the specifications but also is a lightening rod for discussion in the development community. In the Twitter blogs and developer groups, OAuth is being considered deeply in the trade-offs in implementation, design, and risk in the Twitter ecosystem.
A few areas under discussion is how to remove the re-direction from the process, and also how to keep a running log of all account client accesses available to the user as a way to make sure users are aware and signaling proper account use.
The Twitter API team has been willing to make change happen in the community by deprecating legacy processes, such as basic auth. With the changes coming in OAuth 2.0 the company may be in the best position to bootstrap developer adoption of the new standards.
In this way, OAuth 2.0 need to adapt to the speed and need of the Twitter use cases, to avoid becoming like XML. XML is a good thing, of course, but when push comes to shove, JSON is lighter weight and more compact. This is helping it become the preference for data attribute exchange in APIs like Twitters that support OAuth.
With the rise of the social ecosystem as the hub for authorization, it is becoming clear that the IETF efforts need Twitter as much as Twitter needs the IETF. This seems like a good balance that will guide use cases along the way to practical standards formalization.
There are a lot of questions out there about OAuth 2.0. Top of mind is whether this technology release will see the effective join of Twitter, Facebook, and Google? Or, will the practical matters of business and strategy keep the standards intact, and the implementations as islands?
What is your prediction for OAuth 2.0 and web resource authorization?