Here is where I see the differences...

#2 forces "person B" to go through an authentication event at photos.example.com

while #3 allows the client "person B" is using to get the access token at time of authentication to the client.

So, for #2 "person B" will likely have to do 2 authentication events (1 to the client and 1 to photos.example.com). While with #3, "person B" only has to do 1 authentication event (to the client).

Thanks,
George

On 6/8/10 11:32 AM, Brian Eaton wrote:
On Tue, Jun 8, 2010 at 7:17 AM, George Fletcher<gffle...@aol.com>  >
2. Use OpenID and force Person B to "sign in" to photos.example.com
(effectively establishing a relationship with photos.example.com that they
might not want)

3. Have photos.example.com be able to accept a token from person B's
authorization service saying this is person B when accessing the protected
resource.
These two options seem equivalent to me.

They certainly bring up the same user experience challenges.

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to