>> This is a bit hacky, too hacky. Wouldn't it be better for a client that >> recognizes a special MAC cookie to use it to construct Authorization headers >> and omit it from Cookie headers?
> Nope. Sending the value in the Cookie header is important to help > servers implement this scheme without breaking themselves. Why? How? Could you explain this a bit more? Is this so the cookie can be reused as a session id that load balancers can use to implement "sticky" sessions? A key id doesn't sound like a great session id. Wouldn't a separate session cookie be better? Is this so a server can issue MAC credentials, but still accept clients that are unaware of the MAC scheme? That seems possible either way. Is this so a central security server can start issuing MAC credentials while some of its content servers don't understand MAC and just treat the key id as a bearer token? That sounds bad -- client's think they are getting MAC security when they are not. -- James Manger _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth