for Machine-to-
Machine Interactions in RDAP
Caution: This email originated from outside the organization. Do not click links
or open attachments unless you recognize the sender and know the content
is safe.
On Fri, Jul 29, 2022 at 7:59 AM Mario Loffredo
wrote:
The authentication flows explored
> -Original Message-
> From: Andrew Newton
> Sent: Monday, August 1, 2022 4:31 PM
> To: Mario Loffredo
> Cc: Hollenbeck, Scott ; regext@ietf.org
> Subject: [EXTERNAL] Re: [regext] Federated Authentication for Machine-to-
> Machine Interactions in RDAP
>
> Cau
On Fri, Jul 29, 2022 at 7:59 AM Mario Loffredo
wrote:
>
>
> The authentication flows explored so far fit well the use cases where a
> human occasionally submits a request. The case of authenticated software
> agents submitting a lot of requests routinely doesn't find a practical
> solution in this
Hi Scott,
please find my comments below.
Il 27/07/2022 23:48, Hollenbeck, Scott ha scritto:
OAuth 2.0 includes the ability to authorize a class of clients known as
"confidential clients" in a machine-to-machine manner using the "Client
Credentials Grant". The grant is described here:
https://d
Scott, et al,
Great question. One use case that comes to mind is working with law
enforcement. In certain situations, authenticated access to RDAP data is
required to override the default restrictions on disclosure. However, for
operational security reasons, the law enforcement agency (LEA)