Hi all, 

based on the discussion at the conference call last Friday Phil and I have 
added a short writeup about the use cases.
Here is the relevant part from 
http://tools.ietf.org/html/draft-tschofenig-oauth-security-01
  

   6.  Use Cases  . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.1.  Access to an 'Unprotected' Resource  . . . . . . . . . . . 12
     6.2.  Offering Application Layer End-to-End Security . . . . . . 13
     6.3.  Preventing Access Token Re-Use by the Resource Server  . . 13
     6.4.  TLS Channel Binding Support  . . . . . . . . . . . . . . . 14

This draft update was an action item from the last conference call. 

Let us know if you have comments on the writeup. 

Ciao
Hannes & Phil

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to