The intended scope is to provide a transactional model for doing authorization 
delegation, not for authenticating a transaction itself. I can understand the 
confusion! Naming things is hard. 

 — Justin

> On Oct 28, 2019, at 1:55 PM, Kyle Rose <kr...@krose.org> wrote:
> 
> On Mon, Oct 28, 2019 at 11:39 AM Dick Hardt <dick.ha...@gmail.com 
> <mailto:dick.ha...@gmail.com>> wrote:
> Hey OAuthers
> 
> As chair of the Tx BOF coming up in Singapore on Nov 18 @ 5:30-7:30PM Monday 
> Afternoon, I'm gathering who would be interested in making presentations, and 
> how much time you would like. 
> 
> Is this BoF limited to authorization, or would something like end-to-end 
> authentication of transaction request/response via a less trusted 
> intermediary (e.g., an API gateway or CDN) for purposes of limiting 
> transitive trust be in scope? I'm thinking of something akin to OSCORE-style 
> transactions, but more general (e.g., not specific to constrained computing 
> environments, not forcing the use of CBOR).
> 
> Thanks,
> Kyle
> -- 
> Txauth mailing list
> txa...@ietf.org
> https://www.ietf.org/mailman/listinfo/txauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to