> Am 17.11.2019 um 04:06 schrieb David Waite <da...@alkaline-solutions.com>:
> 
> You’ll be audience-scoping either way, so it may make sense to use a 
> symmetric algorithm for both. It starts to look like kerberos in HTTP and 
> JSON when you squint.

Even if audience restriction is a recommended practice, I‘m not fully sure this 
is a broadly established practice.

As you pointed out, symmetrical keys require RS-specific access tokens, i.e. 
the client needs to tell the AS what RS it is going to use the token at. Using 
resource indicators or rar?

This reminds me the simplicity of the approach based on asymmetric crypto re 
programming model and key management.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to