All,

After a request at IETF85 and a reminder from Hannes, I've posted a refresh of 
my original chaining document. No changes have been made in the refresh.

My current position is that this type of chaining (as defined in my earlier 
draft) is useful when you need to get a new token after crossing an 
administrative boundary.  It is less useful when you have servers wanting to 
chain in essentially an act on behalf of case where a 1-leg solution is more 
desirable and 2-legs are costly.

My plan is to work with Justin and reconcile with his work on 
http://tools.ietf.org/id/draft-richer-oauth-chain-00.txt

> A new version of I-D, draft-hunt-oauth-chain-01.txt
> has been successfully submitted by Phil Hunt and posted to the
> IETF repository.
> 
> Filename:      draft-hunt-oauth-chain
> Revision:      01
> Title:                 Chain Grant Type for OAuth2
> Creation date:         2012-11-28
> WG ID:                 Individual Submission
> Number of pages: 10
> URL:             
> http://www.ietf.org/internet-drafts/draft-hunt-oauth-chain-01.txt
> Status:          http://datatracker.ietf.org/doc/draft-hunt-oauth-chain
> Htmlized:        http://tools.ietf.org/html/draft-hunt-oauth-chain-01
> Diff:            http://www.ietf.org/rfcdiff?url2=draft-hunt-oauth-chain-01
> 
> Abstract:
>   This specification defines a method by which an OAuth protected
>   service, can use a received oauth token from its client, to in turn,
>   act as a client and access another OAuth protected service in a
>   'chained' profile.


Phil

@independentid
www.independentid.com
phil.h...@oracle.com





_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to