Hi Taka,

Thank you for the feedback. I understand your point and I agree that
reaching consensus is the priority here.

Given the alignment with RFC 9525, I am fine with using spiffe_id and
allowing wildcards if that is the preferred direction of the community.

Best regards,

Eric

Le jeu. 26 févr. 2026 à 21:41, Takahiko Kawasaki <[email protected]> a
écrit :

> Hi Eric,
>
> Sometimes, it is not logically possible to determine a single definitive
> name for client or server metadata, and in such cases the choice may be
> made based on preference.
>
> My preference is to use a single spiffie_id field to support both 1:1 and
> 1:N mappings. This approach follows the precedent established by X.509
> certificates, specifically the use of Common Name and dNSName as described
> in RFC 9525.
>
> Even if we discuss this further, my personal preference is unlikely to
> change, so it may be appropriate to seek consensus from other experts. For
> my part, I would vote in favor of allowing a wildcard in spiffie_id.
>
> Taka
>
> On Fri, Feb 27, 2026 at 2:17 AM Eric Leleu <[email protected]>
> wrote:
>
>> Pieter, yes this is the proposal. Using a more explicit naming convention
>> would better highlight the potential 1:N relationship, such as
>> 'canonical_spiffe_id' or 'spiffe_id_prefix'.
>>
>> Takahiko, I agree that the specification can explicitly allow wildcards
>> and define restrictions; however, I still favor explicit naming.
>>
>> Le mar. 24 févr. 2026 à 13:07, Takahiko Kawasaki <[email protected]> a
>> écrit :
>>
>>> Considering that, in X.509 certificates for websites, hostnames
>>> containing a wildcard (e.g., *.example.com) can be set in the Subject /
>>> Common Name or Subject Alternative Name / dNSName, I do not think it would
>>> be particularly unnatural to allow a wildcard in the final path segment of
>>> the spiffe_id client metadata.
>>>
>>> To support wildcard behavior, X.509 certificates do not define separate
>>> field names such as “Common Name Prefix” or “dNSName Prefix”; instead, they
>>> simply use the existing Common Name and dNSName fields as they are.
>>>
>>> The following two requirements regarding wildcards described in Section
>>> 6.3, "Matching the DNS Domain Name Portion," of RFC 9525 Service Identity
>>> in TLS (https://www.rfc-editor.org/rfc/rfc9525.html#section-6.3) may
>>> serve as useful references:
>>>
>>> - There is only one wildcard character.
>>> - The wildcard character appears only as the complete content of the
>>> left-most label.
>>>
>>> If we align with these requirements, we could define the requirements
>>> for cases where the spiffe_id client metadata contains a wildcard as
>>> follows:
>>>
>>> - There is only one wildcard character.
>>> - The wildcard character appears only as the last path segment.
>>>
>>> According to the SPIFFE ID specification (
>>> https://github.com/spiffe/spiffe/blob/main/standards/SPIFFE-ID.md),
>>> path segments in a SPIFFE ID "contain only letters, numbers, dots, dashes,
>>> and underscores ([a-zA-Z0-9._-])." However, the wildcard discussed here
>>> applies to the value of the client metadata.
>>>
>>>
>>> On Tue, Feb 24, 2026 at 8:21 PM Pieter Kasselman <[email protected]>
>>> wrote:
>>>
>>>> Thanks Aaron, Eric and Emelia
>>>>
>>>> Aaron, the wildcarding is not a SPIFFE construct, it is meant as a way
>>>> to say "SPIFFE IDs starting with this trust domain and path should be
>>>> allowed to present their credentials when using the client_id", thereby
>>>> creating a one (client_id) to many (instance id) mapping. SPIFFE
>>>> identifiers are hierarchical, and one way in which they can be used to
>>>> become increasingly specific as additional path elements are added (this is
>>>> deployment specific). The choice of how to construct a SPIFFE ID is up to a
>>>> deployment.
>>>>
>>>> Emelia, Eric, if I understand your proposal correctly, your suggesting
>>>> that instead of using wildcarding (which can also be problematic), create
>>>> an additional metadata item like "spiffe_instance_prefix" for cases where
>>>> that kind of 1:many mapping  is desirable/feasible and keep it
>>>> separate from the "spiffe_id" which always provides a 1:1 mapping?
>>>>
>>>> Cheers
>>>>
>>>> Pieter
>>>>
>>>> On Tue, Feb 24, 2026 at 8:54 AM Eric Leleu <
>>>> [email protected]> wrote:
>>>>
>>>>> Hi,
>>>>>
>>>>> I agree with Emelia, if the metadata document has to provide a base
>>>>> URI for the spiffe identifiers it may be more appropriate to name it
>>>>> explicitly.
>>>>>
>>>>> Regards,
>>>>> Eric
>>>>>
>>>>> ps: This is the first time I publish a comment in the mailing list,
>>>>> sorry if I'm not following the good practices.
>>>>>
>>>>> Le lun. 23 févr. 2026 à 18:55, Emelia S. <emelia=
>>>>> [email protected]> a écrit :
>>>>>
>>>>>> Maybe instead of `spiffe_id` which I think should be singular, you'd
>>>>>> instead have like a spiffe_issuer or spiffe_origin (I don't know the 
>>>>>> right
>>>>>> language here), which would be explicit in the "all spiffe_id's with this
>>>>>> prefix are valid for this client_id"
>>>>>>
>>>>>> Would that make sense?
>>>>>>
>>>>>> — Emelia
>>>>>>
>>>>>> On 23 Feb 2026, at 17:31, Pieter Kasselman <[email protected]>
>>>>>> wrote:
>>>>>>
>>>>>> Thanks Taku and Emelia
>>>>>>
>>>>>> Taku, that is an interesting idea - I did not think of that approach!
>>>>>> Emelia, thanks for sharing the context on why query parameters could get 
>>>>>> an
>>>>>> implementer into trouble.
>>>>>>
>>>>>> I was thinking that the URL would represent the client_id of a class
>>>>>> of clients (no need for query parameters), but that each instance of that
>>>>>> class could have its own SPIFFE ID (which represents an instance). If 
>>>>>> there
>>>>>> are 100 instances of the client, you would still use the same client_id
>>>>>> with CIMD, but then allow each instance of the client to authenticate 
>>>>>> using
>>>>>> their SPIFFE credential, which contain its own unique identifier. The 
>>>>>> idea
>>>>>> was to extend from a 1:1 mapping between client_id and SPIFFE Id to a
>>>>>> 1:many mapping, where the SPIFFE IDs would instance identifiers.
>>>>>>
>>>>>> I was thinking that the CIMD URL would indicate a class of client,
>>>>>> while the SPIFFE credentials would represent individual instances.
>>>>>>
>>>>>> metadata = {
>>>>>> client_id: "https://example.com/client.json";,
>>>>>> spiffe_id: "spiffe://example.org/client/*"
>>>>>> }
>>>>>>
>>>>>> This allows any client instance to use their credentials (e.g.
>>>>>> spiffe://example.org/client/1 or spiffe://example.org/client/2 etc).
>>>>>> The AS can accept the credentials as valid, and also use the additional
>>>>>> information for other purposes (audit logs, or perhaps adding it as 
>>>>>> claims
>>>>>> to a token or expose it through a introspection point etc).
>>>>>>
>>>>>> This way the client_id URL represents a class of clients, and the
>>>>>> SPIFFE ID specific instances by allowing wildcard mapping (the 
>>>>>> alternative
>>>>>> is publishing hundreds, maybe thousands of CIMD documents that is
>>>>>> identical, except for the SPIFFE ID).
>>>>>>
>>>>>> Cheers
>>>>>>
>>>>>> Pieter
>>>>>>
>>>>>> On Sat, Feb 21, 2026 at 4:53 AM Emelia S. <[email protected]>
>>>>>> wrote:
>>>>>>
>>>>>>> We deliberately have them as part of the client ID and discouraged,
>>>>>>> because we want to prevent people from doing not quite what you're doing
>>>>>>> but very similar: it's quite easy to foot-gun oneself with like "oh but 
>>>>>>> I
>>>>>>> want to vary redirect_uris by query param", and now boom, you've got the
>>>>>>> same client ID and any random app can impersonate you because you've
>>>>>>> created an open-redirector effectively.
>>>>>>>
>>>>>>> Their CIMD no longer has a fixed set of redirect_uris so an attacker
>>>>>>> can override to their evil.example domain and the end-user would think 
>>>>>>> the
>>>>>>> authorization request legitimate.
>>>>>>>
>>>>>>> Sadly, I've seen people try and do dynamically generated CIMDs like
>>>>>>> that, and getting all sorts of nasty security issues.
>>>>>>>
>>>>>>> By discouraging query parameters, we encourage use of "stable URIs",
>>>>>>> so like http://cimd-service.fly.dev can generate CIMD documents,
>>>>>>> but each has a CID (a hash) of the document contents as the path 
>>>>>>> component,
>>>>>>> so it will always be the same doc for same client_id, and my server 
>>>>>>> there
>>>>>>> is actually storing client_id => doc mapping.
>>>>>>>
>>>>>>> Sure, someone could recreate query parameters in the path component,
>>>>>>> but it's much less intuitive to do than just using query components.
>>>>>>>
>>>>>>> — Emelia
>>>>>>>
>>>>>>> On 21 Feb 2026, at 04:31, Takahiko Kawasaki <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>> Hi Pieter,
>>>>>>>
>>>>>>> As of the last time I checked the CIMD specification, including
>>>>>>> query parameters in the client ID is discouraged. However, if they are
>>>>>>> included, then (unless I am mistaken) they are considered part of the
>>>>>>> client ID. In other words,
>>>>>>> https://example.com/client.json?instance_id=1 and
>>>>>>> https://example.com/client.json?instance_id=2 would be recognized
>>>>>>> as different clients.
>>>>>>>
>>>>>>> However, if the CIMD specification were slightly revised to state
>>>>>>> that query parameters are not considered part of the client ID, it would
>>>>>>> become possible to generate different metadata documents for multiple
>>>>>>> instances of a single client by using query parameters. In that case, 
>>>>>>> the
>>>>>>> scalability concerns you mentioned could be mitigated.
>>>>>>>
>>>>>>> Below is an example implementation (attached: cimd-client-host.rb)
>>>>>>> of a Client ID Metadata Document that embeds the value of the 
>>>>>>> instance_id
>>>>>>> query parameter as part of the SPIFFE ID.
>>>>>>>
>>>>>>> #!/usr/bin/env ruby
>>>>>>>
>>>>>>> require 'sinatra'
>>>>>>> require 'json'
>>>>>>>
>>>>>>> # The endpoint that issues a Client ID Metadata Document
>>>>>>> get '/client.json' do
>>>>>>> content_type :json
>>>>>>>
>>>>>>> metadata = {
>>>>>>> client_id: "https://example.com/client.json";,
>>>>>>> spiffe_id: "spiffe://example.org/client/#{params['instance_id']}"
>>>>>>> }
>>>>>>>
>>>>>>> JSON.pretty_generate(metadata)
>>>>>>> end
>>>>>>>
>>>>>>>
>>>>>>> If you start this program on your local machine:
>>>>>>>
>>>>>>> ./cimd-client-host.rb
>>>>>>>
>>>>>>>
>>>>>>> and access it as follows:
>>>>>>>
>>>>>>> curl http://localhost:4567/client.json?instance_id=1
>>>>>>>
>>>>>>>
>>>>>>> you will receive the following response:
>>>>>>>
>>>>>>> {
>>>>>>> "client_id": "https://example.com/client.json";,
>>>>>>> "spiffe_id": "spiffe://example.org/client/1"
>>>>>>> }
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Sat, Feb 21, 2026 at 11:39 AM Takahiko Kawasaki <
>>>>>>> [email protected]> wrote:
>>>>>>>
>>>>>>>> Hi Jeff,
>>>>>>>>
>>>>>>>> My intuition is that, since the OAuth SPIFFE Client Authentication
>>>>>>>> specification defines a client authentication method that depends on
>>>>>>>> SPIFFE, it is natural to use the spiffe_ prefix for the metadata 
>>>>>>>> required
>>>>>>>> by that method.
>>>>>>>>
>>>>>>>> If a generic parameter such as client_alternate_id is needed, I
>>>>>>>> believe it would be better to define it in a more abstract 
>>>>>>>> specification—at
>>>>>>>> a level of abstraction comparable to RFC 7521—rather than within the 
>>>>>>>> OAuth
>>>>>>>> SPIFFE Client Authentication specification itself.
>>>>>>>>
>>>>>>>>
>>>>>>>> On Sat, Feb 21, 2026 at 4:57 AM Takahiko Kawasaki <
>>>>>>>> [email protected]> wrote:
>>>>>>>>
>>>>>>>>> I have created a diagram illustrating what I am proposing (i.e.,
>>>>>>>>> how SPIFFE Client Authentication can coexist with CIMD), and I am 
>>>>>>>>> attaching
>>>>>>>>> it to this email. If the attached image is removed by the mailing list
>>>>>>>>> system and cannot be accessed, please refer to the diagram that I have
>>>>>>>>> posted in the issue tracker.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> https://github.com/arndt-s/oauth-spiffe-client-authentication/issues/30#issuecomment-3936816934
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Sat, Feb 21, 2026 at 3:50 AM Pieter Kasselman
>>>>>>>>> <[email protected]> wrote:
>>>>>>>>>
>>>>>>>>>> Thanks Tako - this looks like a very promising approach.
>>>>>>>>>>
>>>>>>>>>> I wonder if this can also help with per-instance identifiers.
>>>>>>>>>>
>>>>>>>>>> With SPIFFE, it is common to assign identifiers at
>>>>>>>>>> individual workload level, so you may have one application that have 
>>>>>>>>>> 100
>>>>>>>>>> instances (individual workloads), with each of these having their own
>>>>>>>>>> unique SPIFFE credential ("spiffe://example.org/my-oauth-client/1
>>>>>>>>>> ", "spiffe://example.org/my-oauth-client/2", "spiffe://
>>>>>>>>>> example.org/my-oauth-client/3", ... "spiffe://
>>>>>>>>>> example.org/my-oauth-client/100"). One option is to publish a
>>>>>>>>>> CIMD document for each of those workloads, but this has scale issues,
>>>>>>>>>> especially. in dynamic environments. Perhaps this can be handled 
>>>>>>>>>> through
>>>>>>>>>> some kind of wild-carding in defining the spifffe_id (e.g.
>>>>>>>>>> "spiffe://example.org/my-oauth-client/*").
>>>>>>>>>>
>>>>>>>>>> Cheers
>>>>>>>>>>
>>>>>>>>>> Pieter
>>>>>>>>>>
>>>>>>>>>> On Fri, Feb 20, 2026 at 5:35 PM Takahiko Kawasaki <
>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>
>>>>>>>>>>> Hi Aaron,
>>>>>>>>>>>
>>>>>>>>>>> Yes, what I expect the Client ID Metadata Document to contain is
>>>>>>>>>>> as follows:
>>>>>>>>>>>
>>>>>>>>>>> "token_endpoint_auth_method": "spiffe_jwt" or "spiffe_x509",
>>>>>>>>>>> "spiffe_id": "spiffe://example.org/my-oauth-client",
>>>>>>>>>>> "spiffe_bundle_endpoint": "https://example.org/bundle";
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On Sat, Feb 21, 2026 at 2:17 AM Lombardo, Jeff <jeffsec=
>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> I concur on this strategy being the one that can rule all the
>>>>>>>>>>>> cases [and in the light binds them].
>>>>>>>>>>>>
>>>>>>>>>>>> When using CIMD, it must become the source of truth for a
>>>>>>>>>>>> client_id and all its possible aliases.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *Jean-François “Jeff” Lombardo* | Amazon Web Services
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Architecte Principal de Solutions, Spécialiste de Sécurité
>>>>>>>>>>>> Principal Solution Architect, Security Specialist
>>>>>>>>>>>> Montréal, Canada
>>>>>>>>>>>>
>>>>>>>>>>>> *Commentaires à propos de notre échange? **Exprimez-vous **ici*
>>>>>>>>>>>> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
>>>>>>>>>>>> *.*
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *Thoughts on our interaction? Provide feedback **here*
>>>>>>>>>>>> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
>>>>>>>>>>>> *.*
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *From:* Aaron Parecki <[email protected]>
>>>>>>>>>>>> *Sent:* February 20, 2026 12:09 PM
>>>>>>>>>>>> *To:* Emelia S. <[email protected]>
>>>>>>>>>>>> *Cc:* oauth <[email protected]>
>>>>>>>>>>>> *Subject:* [EXT] [OAUTH-WG] Re: IANA OAuth Parameters for
>>>>>>>>>>>> SPIFFE Client Authentication
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *CAUTION*: This email originated from outside of the
>>>>>>>>>>>> organization. Do not click links or open attachments unless you 
>>>>>>>>>>>> can confirm
>>>>>>>>>>>> the sender and know the content is safe.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *AVERTISSEMENT*: Ce courrier électronique provient d’un
>>>>>>>>>>>> expéditeur externe. Ne cliquez sur aucun lien et n’ouvrez aucune 
>>>>>>>>>>>> pièce
>>>>>>>>>>>> jointe si vous ne pouvez pas confirmer l’identité de l’expéditeur 
>>>>>>>>>>>> et si
>>>>>>>>>>>> vous n’êtes pas certain que le contenu ne présente aucun risque.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> It sounds like the CIMD would publish the `spiffe_id` in the
>>>>>>>>>>>> metadata, that way the SPIFFE-ID in the SVID can be validated 
>>>>>>>>>>>> against the
>>>>>>>>>>>> value in the CIMD? That sounds like it would work.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On Fri, Feb 20, 2026 at 9:06 AM Emelia S. <emelia=
>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> > SPIFFE Client Authentication with JWT-SVIDs requires the
>>>>>>>>>>>> authorization server to ensure that the SPIFFE ID in the SVID 
>>>>>>>>>>>> matches the
>>>>>>>>>>>> registered value, but the specification does not define how this
>>>>>>>>>>>> verification is to be performed. If the spiffe_id client
>>>>>>>>>>>> metadata is available, the authorization server can satisfy this
>>>>>>>>>>>> requirement by comparing the registered metadata value with the 
>>>>>>>>>>>> SPIFFE ID
>>>>>>>>>>>> contained in the SVID.
>>>>>>>>>>>>
>>>>>>>>>>>> The spiffe_id would mismatch with client_id right? For using it
>>>>>>>>>>>> with CIMD?
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> – Emelia
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On 20 Feb 2026, at 17:57, Takahiko Kawasaki <[email protected]>
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Hello,
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *SPIFFE-CLIENT-AUTH ISSUE 30: IANA OAuth Parameters for SPIFFE
>>>>>>>>>>>> Client Authentication*
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> https://github.com/arndt-s/oauth-spiffe-client-authentication/issues/30
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> I would like to propose the following IANA OAuth Parameters
>>>>>>>>>>>> <https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml>
>>>>>>>>>>>>  for
>>>>>>>>>>>> SPIFFE Client Authentication:
>>>>>>>>>>>> OAuth Dynamic Client Registration Metadata
>>>>>>>>>>>>
>>>>>>>>>>>>    - spiffe_id
>>>>>>>>>>>>    - spiffe_bundle_endpoint
>>>>>>>>>>>>
>>>>>>>>>>>> OAuth Token Endpoint Authentication Methods
>>>>>>>>>>>>
>>>>>>>>>>>>    - spiffe_jwt
>>>>>>>>>>>>    - spiffe_x509
>>>>>>>>>>>>
>>>>>>>>>>>> Rationale for spiffe_id
>>>>>>>>>>>> SPIFFE Client Authentication with JWT-SVIDs requires the
>>>>>>>>>>>> authorization server to ensure that the SPIFFE ID in the SVID 
>>>>>>>>>>>> matches the
>>>>>>>>>>>> registered value, but the specification does not define how this
>>>>>>>>>>>> verification is to be performed. If the spiffe_id client
>>>>>>>>>>>> metadata is available, the authorization server can satisfy this
>>>>>>>>>>>> requirement by comparing the registered metadata value with the 
>>>>>>>>>>>> SPIFFE ID
>>>>>>>>>>>> contained in the SVID.
>>>>>>>>>>>> Rationale for spiffe_bundle_endpoint
>>>>>>>>>>>> Because the location of the SPIFFE Bundle Endpoint cannot be
>>>>>>>>>>>> inferred from the SPIFFE ID or the SVID, it must be preconfigured. 
>>>>>>>>>>>> However,
>>>>>>>>>>>> the specification does not define how this configuration is to be
>>>>>>>>>>>> performed. If the spiffe_bundle_endpoint client metadata is
>>>>>>>>>>>> available, the authorization server can use it to store the 
>>>>>>>>>>>> preconfigured
>>>>>>>>>>>> value.
>>>>>>>>>>>> Rationale for spiffe_jwt and spiffe_x509
>>>>>>>>>>>>
>>>>>>>>>>>> The token_endpoint_auth_method client metadata and the
>>>>>>>>>>>> token_endpoint_auth_methods_supported server metadata require
>>>>>>>>>>>> identifiers representing the new client authentication methods 
>>>>>>>>>>>> defined by
>>>>>>>>>>>> this specification.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Best Regards,
>>>>>>>>>>>>
>>>>>>>>>>>> Taka @ Authlete
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> OAuth mailing list -- [email protected]
>>>>>>>>>>>> To unsubscribe send an email to [email protected]
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> OAuth mailing list -- [email protected]
>>>>>>>>>>>> To unsubscribe send an email to [email protected]
>>>>>>>>>>>>
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> OAuth mailing list -- [email protected]
>>>>>>>>>>>> To unsubscribe send an email to [email protected]
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> --
>>>>>>>>>>> *Takahiko Kawasaki*
>>>>>>>>>>> Co-Founder
>>>>>>>>>>> [email protected]
>>>>>>>>>>> [image: Authlete]
>>>>>>>>>>> authlete.com <https://www.authlete.com/> |Linkedin
>>>>>>>>>>> <https://www.linkedin.com/company/authlete/>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> OAuth mailing list -- [email protected]
>>>>>>>>>>> To unsubscribe send an email to [email protected]
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> --
>>>>>>>>> *Takahiko Kawasaki*
>>>>>>>>> Co-Founder
>>>>>>>>> [email protected]
>>>>>>>>> [image: Authlete]
>>>>>>>>> authlete.com <https://www.authlete.com/> |Linkedin
>>>>>>>>> <https://www.linkedin.com/company/authlete/>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> --
>>>>>>>> *Takahiko Kawasaki*
>>>>>>>> Co-Founder
>>>>>>>> [email protected]
>>>>>>>> [image: Authlete]
>>>>>>>> authlete.com <https://www.authlete.com/> |Linkedin
>>>>>>>> <https://www.linkedin.com/company/authlete/>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> *Takahiko Kawasaki*
>>>>>>> Co-Founder
>>>>>>> [email protected]
>>>>>>> [image: Authlete]
>>>>>>> authlete.com <https://www.authlete.com/> |Linkedin
>>>>>>> <https://www.linkedin.com/company/authlete/>
>>>>>>> <cimd-client-host.rb>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list -- [email protected]
>>>>>> To unsubscribe send an email to [email protected]
>>>>>>
>>>>>
>>>>>
>>>>> --
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Eric LELEU
>>>>>
>>>>> Staff Software Engineer / AM Teach Lead
>>>>>
>>>>> E [email protected] <[email protected]>
>>>>>
>>>>> Hold Nothing Back
>>>>> <http://youtube.com/c/Graviteesource?sub_confirmation=1>
>>>>> <https://www.linkedin.com/company/gravitee-io>
>>>>>
>>>> _______________________________________________
>>>> OAuth mailing list -- [email protected]
>>>> To unsubscribe send an email to [email protected]
>>>>
>>>
>>>
>>> --
>>> *Takahiko Kawasaki*
>>> Co-Founder
>>> [email protected]
>>> [image: Authlete]
>>> authlete.com <https://www.authlete.com/> |Linkedin
>>> <https://www.linkedin.com/company/authlete/>
>>>
>>
>>
>> --
>>
>>
>>
>>
>> Eric LELEU
>>
>> Staff Software Engineer / AM Teach Lead
>>
>> E [email protected] <[email protected]>
>>
>> Hold Nothing Back
>> <http://youtube.com/c/Graviteesource?sub_confirmation=1>
>> <https://www.linkedin.com/company/gravitee-io>
>>
>
>
> --
> *Takahiko Kawasaki*
> Co-Founder
> [email protected]
> [image: Authlete]
> authlete.com <https://www.authlete.com/> |Linkedin
> <https://www.linkedin.com/company/authlete/>
>


-- 




Eric LELEU

Staff Software Engineer / AM Teach Lead

E [email protected] <[email protected]>

Hold Nothing Back
<http://youtube.com/c/Graviteesource?sub_confirmation=1>
<https://www.linkedin.com/company/gravitee-io>
_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to