On the call people wanted me to clarify what I meant when I talked
about operational security.  In a nutshell, I mean:

- what systems and what people have access to long-lived secrets?
   Keep this to a reasonable level, where reasonable is defined by
different use cases.

- what systems and what people have access to shorter-lived secrets?
   Repeat above caveat about reasonable protection.

- how are those secrets protected?
   Repeat above caveat about reasonable protection.

- deal with practical considerations of systems that people really build.
   Issues like latency, scalability, functionality, and complexity
impact all of the above.

Cheers,
Brian
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to