On Fri, Jul 16, 2010 at 4:47 AM, <[email protected]> wrote: > +1 to Thorstens statement. There are use cases beyond local deployments.
Definitely. For example, I'm interested in deployments where neither clients nor resource servers need secret keys. This makes adding new clients and resource servers trivial. The challenge here is that even though lots of people are interested in various semantics for "scope", and various types of relations between clients, resource servers, and authorization servers, not everyone has the same use cases and requirements. _______________________________________________ OAuth mailing list [email protected] https://www.ietf.org/mailman/listinfo/oauth
