Difference between revisions of "Standards:GMCP Authentication"

From Mudlet
Jump to navigation Jump to search
(→‎Client.Authenticate.Default: add an optimisation for sending supports quicker)
(Rename to Char.Login)
Line 9: Line 9:
 
=== Design ===
 
=== Design ===
  
The extension introduces a new namespace called <code>Client.Authenticate</code> with the following commands:
+
The extension introduces a new namespace called <code>Char.Login</code> with the following commands:
  
 
==== Server-side ====
 
==== Server-side ====
  
===== Client.Authenticate.Default=====
+
===== Char.Login.Default=====
  
 
Sent in response to <code>Client.Supports.Set</code>, or as soon as telnet negotiation completes, it informs the client of the supported authentication methods:
 
Sent in response to <code>Client.Supports.Set</code>, or as soon as telnet negotiation completes, it informs the client of the supported authentication methods:
Line 23: Line 23:
 
Since multiple flows can be supported by a server, the <code>type</code> array shall be ordered in the descending order of preference by the server. For example, if the server supports only the credentials flow:
 
Since multiple flows can be supported by a server, the <code>type</code> array shall be ordered in the descending order of preference by the server. For example, if the server supports only the credentials flow:
  
   Client.Authenticate.Default {"type": ["password-credentials"]}
+
   Char.Login.Default {"type": ["password-credentials"]}
  
 
If the server supports both OAuth and credentials and prefers OAuth:
 
If the server supports both OAuth and credentials and prefers OAuth:
  
   Client.Authenticate.Default {"type": ["oauth", "password-credentials"], "location": "<nowiki>https://example.com/.well-known/openid-configuration</nowiki>" }
+
   Char.Login.Default {"type": ["oauth", "password-credentials"], "location": "<nowiki>https://example.com/.well-known/openid-configuration</nowiki>" }
  
===== Client.Authenticate.Result =====  
+
===== Char.Login.Result =====  
Sent in response to <code>Client.Authenticate.Credentials</code>, it informs the client of the success or failure of the credentials-based login.  
+
Sent in response to <code>Char.Login.Credentials</code>, it informs the client of the success or failure of the credentials-based login.  
 
* <code>success</code>: (boolean, required) Indicates whether the authentication attempt was successful.
 
* <code>success</code>: (boolean, required) Indicates whether the authentication attempt was successful.
 
* <code>message</code>: (string, required if <code>success</code> is false) required string if the login wasn't successful: a human-readable message explaining the result, such as "Invalid credentials" or "Character not found".
 
* <code>message</code>: (string, required if <code>success</code> is false) required string if the login wasn't successful: a human-readable message explaining the result, such as "Invalid credentials" or "Character not found".
Line 36: Line 36:
 
==== Client-side ====
 
==== Client-side ====
  
===== Client.Authenticate.Credentials =====  
+
===== Char.Login.Credentials =====  
After receiving <code>Client.Authenticate.Default</code> with <code>type</code> as <code>password-credentials</code>, the client sends the character name and password for traditional login.
+
After receiving <code>Char.Login.Default</code> with <code>type</code> as <code>password-credentials</code>, the client sends the character name and password for traditional login.
  
 
* <code>account</code> (string, required): character name or the player account name. For games that implement both player and character names, the character name can be included after a colon (:), for example <code>myaccount:mycharacter</code>.
 
* <code>account</code> (string, required): character name or the player account name. For games that implement both player and character names, the character name can be included after a colon (:), for example <code>myaccount:mycharacter</code>.
Line 45: Line 45:
 
'''Example Flow (Password Credentials):'''
 
'''Example Flow (Password Credentials):'''
  
# Client connects and sends: <code>Core.Supports.Set [&quot;Client.Authenticate 1&quot;, ...]</code>
+
# Client connects and sends: <code>Core.Supports.Set [&quot;Char.Login 1&quot;, ...]</code>
# Server responds with: <code>Client.Authenticate.Default {&quot;type&quot;: [&quot;password-credentials&quot;]}</code>
+
# Server responds with: <code>Char.Login.Default {&quot;type&quot;: [&quot;password-credentials&quot;]}</code>
# Client sends: <code>Client.Authenticate.Credentials {&quot;account&quot;: &quot;username&quot;, &quot;password&quot;: &quot;password&quot;}</code>
+
# Client sends: <code>Char.Login.Credentials {&quot;account&quot;: &quot;username&quot;, &quot;password&quot;: &quot;password&quot;}</code>
 
# Server validates credentials and performs login.  
 
# Server validates credentials and performs login.  
  

Revision as of 15:18, 28 February 2024

GMCP Extension for MUD Client Authentication

This document defines a new GMCP extension to enable MUD clients to send credentials and perform authentication using GMCP messages instead of in-band login commands. It also includes optional support for OAuth authorization flows.

Rationale

Different MUDs have diverse login command formats, making it challenging for MUD clients to handle login consistently. This extension provides a standardized way to exchange authentication information through GMCP, simplifying client development and improving compatibility. Additionally, the extension supports OAuth authorization flows, allowing clients to leverage external identity providers for login.

Design

The extension introduces a new namespace called Char.Login with the following commands:

Server-side

Char.Login.Default

Sent in response to Client.Supports.Set, or as soon as telnet negotiation completes, it informs the client of the supported authentication methods:

  • type (array of strings, required): indicates the supported method(s), which is one or more of:
    • password-credentials: traditional username/password login.
    • oauth: OAuth-based login.
  • location (string, required if type is oauth): openid-configuration location. See https://openid.net/specs/openid-connect-discovery-1_0.html

Since multiple flows can be supported by a server, the type array shall be ordered in the descending order of preference by the server. For example, if the server supports only the credentials flow:

 Char.Login.Default {"type": ["password-credentials"]}

If the server supports both OAuth and credentials and prefers OAuth:

 Char.Login.Default {"type": ["oauth", "password-credentials"], "location": "https://example.com/.well-known/openid-configuration" }
Char.Login.Result

Sent in response to Char.Login.Credentials, it informs the client of the success or failure of the credentials-based login.

  • success: (boolean, required) Indicates whether the authentication attempt was successful.
  • message: (string, required if success is false) required string if the login wasn't successful: a human-readable message explaining the result, such as "Invalid credentials" or "Character not found".

Client-side

Char.Login.Credentials

After receiving Char.Login.Default with type as password-credentials, the client sends the character name and password for traditional login.

  • account (string, required): character name or the player account name. For games that implement both player and character names, the character name can be included after a colon (:), for example myaccount:mycharacter.
  • password (string, required): character password. Servers are encouraged to implement TLS over telnet to allow secure transmission of passwords.


Example Flow (Password Credentials):

  1. Client connects and sends: Core.Supports.Set ["Char.Login 1", ...]
  2. Server responds with: Char.Login.Default {"type": ["password-credentials"]}
  3. Client sends: Char.Login.Credentials {"account": "username", "password": "password"}
  4. Server validates credentials and performs login.


Example password flow (source)


OAuth Flows

Specific details for the OAuth flow will be detailed once it is worked out with the community.

Implementation Considerations

  • This extension should be implemented according to the GMCP protocol specifications.
  • Messages should be well-formatted JSON objects.
  • Servers should validate incoming authentication information securely.
  • Clients should handle potential errors and server responses gracefully.

Conclusion

This GMCP extension provides a standardized and flexible approach to MUD client authentication, improving compatibility and enabling support for OAuth authorization flows. By adopting this extension, MUD developers and client developers can simplify login processes and enhance user experience.

Note: This is a draft proposal, and further community input and refinement may be necessary before finalizing the specification. Additionally, the specific details of OAuth flow support require input from the community to be defined.