Ping Identity has implementations of the functionality in this document for
the authorization server and resource server roles.

On Tue, Dec 20, 2022 at 6:16 AM Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com>
wrote:

> All,
>
> As part of the shepherd write-up for the OAuth 2.0 Step-up Authentication
> Challenge Protocol document,
> we are looking for information about implementations of this draft.
>
>
> https://www.ietf.org/archive/id/draft-ietf-oauth-step-up-authn-challenge-08.html
>
> Please, reply to this email, on the mailing list, with any implementations
> that you are aware of to support this document.
>
> Regards,
> Rifaat
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to