Can you apply this (without too much detail) to both WRAP and OAuth 1.0a? I 
think it would be useful to see how each comply with these goals (which look 
pretty important to me).

EHL

> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Brian Eaton
> Sent: Thursday, February 18, 2010 12:36 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] operational security
> 
> On the call people wanted me to clarify what I meant when I talked about
> operational security.  In a nutshell, I mean:
> 
> - what systems and what people have access to long-lived secrets?
>    Keep this to a reasonable level, where reasonable is defined by different
> use cases.
> 
> - what systems and what people have access to shorter-lived secrets?
>    Repeat above caveat about reasonable protection.
> 
> - how are those secrets protected?
>    Repeat above caveat about reasonable protection.
> 
> - deal with practical considerations of systems that people really build.
>    Issues like latency, scalability, functionality, and complexity impact all 
> of the
> above.
> 
> Cheers,
> Brian
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to