Ping Identity has implementations of the functionality in this document for the authorization server and resource server roles.
On Tue, Dec 20, 2022 at 6:16 AM Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com> wrote: > All, > > As part of the shepherd write-up for the OAuth 2.0 Step-up Authentication > Challenge Protocol document, > we are looking for information about implementations of this draft. > > > https://www.ietf.org/archive/id/draft-ietf-oauth-step-up-authn-challenge-08.html > > Please, reply to this email, on the mailing list, with any implementations > that you are aware of to support this document. > > Regards, > Rifaat > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > -- _CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited. If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you._
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth