Joseph,
Any help you could provide to flesh out (or heavily modify) these specs
would be most appreciated.
Thanks,
John Ehn
extremeswank.com
On 10/22/07, Joseph Holsten [EMAIL PROTECTED] wrote:
Wow, these are neat. Thanks for the links david, and especially the
work john!
OK, so the
Hey all,
I know John did some work in September (http://extremeswank.com/
openid_trusted_auth.html and http://extremeswank.com/
openid_inline_auth.html). Both solve extremely important use-cases
and are becoming increasingly discussed especially with the advent of
OAuth. I'd really like to
Wow, these are neat. Thanks for the links david, and especially the
work john!
OK, so the Inline Auth use case seems like a straightforward case for
OAuth: resource url = identifier, user auth url = delegate.
Successfully accessing the resource after negotiation would imply
that the user