Hi Tharika, +1, Nicely explained. I have only one comment,
On Wed, Sep 2, 2015 at 9:57 AM, Tharika Madurapperuma <[email protected]> wrote: > The *qop*(Quality Of Protection) can be one of auth, auth-int etc. and > has influence on how the hash is created. We use auth here. > I think it is better if we can allowed users (API developers) to use any *qop* method as per their wish, I meant we should not strict only to ' *auth*' method here. -Roshan. -- Roshan Wijesena. Senior Software Engineer-WSO2 Inc. Mobile: *+94719154640* Email: [email protected] *WSO2, Inc. :** wso2.com <http://wso2.com/>* lean.enterprise.middleware.
_______________________________________________ Architecture mailing list [email protected] https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
