Hi Tharika,

+1, Nicely explained. I have only one comment,

On Wed, Sep 2, 2015 at 9:57 AM, Tharika Madurapperuma <[email protected]>
wrote:

> The *qop*(Quality Of Protection) can be one of auth, auth-int etc. and
> has influence on how the hash is created. We use auth here.
>

I think it is better if  we can allowed  users (API developers) to use any
*qop* method as per their wish, I meant we should not strict only to  '
*auth*' method here.

-Roshan.

-- 
Roshan Wijesena.
Senior Software Engineer-WSO2 Inc.
Mobile: *+94719154640*
Email: [email protected]
*WSO2, Inc. :** wso2.com <http://wso2.com/>*
lean.enterprise.middleware.
_______________________________________________
Architecture mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to