John Panzer wrote:
...

Are you saying that the protocol must enforce "strongest auth" in all cases? Or that the protocol must understand the security implications of the data and make appropriate decisions? (I'm assuming the former.)


Yes, exactly. I am for the "strongest auth."
Igor
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to