[OAUTH-WG] Re: OAuth 2.0 Protected Resource Metadata - Implementations
Giuseppe De Marco <demarcog83@gmail.com> Wed, 10 July 2024 23:17 UTC
Return-Path: <demarcog83@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F812C14F6B8 for <oauth@ietfa.amsl.com>; Wed, 10 Jul 2024 16:17:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.855
X-Spam-Level:
X-Spam-Status: No, score=-6.855 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rbAeNlm_Xxpd for <oauth@ietfa.amsl.com>; Wed, 10 Jul 2024 16:17:21 -0700 (PDT)
Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85D6EC14F6BC for <oauth@ietf.org>; Wed, 10 Jul 2024 16:17:21 -0700 (PDT)
Received: by mail-ed1-x52b.google.com with SMTP id 4fb4d7f45d1cf-58b447c513aso359577a12.2 for <oauth@ietf.org>; Wed, 10 Jul 2024 16:17:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1720653439; x=1721258239; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=3xAXudhYZ/38nPyD1lbAPRjw9iQCj41VjX1s8B5E4MI=; b=W4BMziDj+Sza8wygvPTIOXyofDtXadWFpM9OnPYnA6m7l2PanRlE+at6RQlnWjmrdu 4tEu2T6FVAdx1UA85dSVPY896wO4M/yXy0dix7pj6nsCKAaPwzneN+h/bpwpWCXxGggR zafXbaI9+my1Nl156Leno+ux/QpZ2wtGHQCHXy56yCL0NRvAA4RGvUnXtyfRSk2P7k5y uARX5Nd5NwLkK9Ta3tNAjvNhtzXN9pUBQhP6q8ss+lLa49Bljj+kYp6L9bl1+XtGEdFV BSVR8PX2SwOgJdghV1ylIsDY3pmzZPr4DpjhuSLm0c/WYlvxO8LQjdyzE+8nUaZ+10cG xeEA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1720653439; x=1721258239; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=3xAXudhYZ/38nPyD1lbAPRjw9iQCj41VjX1s8B5E4MI=; b=S2oC+JYW6XDe7ooA42vJxfyAm295LeUqVpcRkAo8bHVISMDUZ6zULPKNBewbA6zJQZ JyH7omXjg4WciELE9orIPGJVWL+fogK7WSMorGhZ5W1voCaxIChZxDsikbskL7+ft1A+ RrUFaMPTPCWwvWYrKRzRa7q0zQKXUJzW7Q7TcIMbwFBdysPMFSVly4Nqv+Tc5gVVuaE6 MZbPCdeaPp0anl5zydcDDzCLLJQakELF7Wdz/gH31Bzs1k+yQjXaNs0LkJSYqpD3y4C7 BGBc116lZU1ybJxoqRjntXFRIukcpugyHhsTQtkjp9pDq9hRYLDZoPrz+HfLT/62I6c6 njeA==
X-Forwarded-Encrypted: i=1; AJvYcCXoWUQDNjIBofLkogmGQm3NPqQUx6IqtsF7kE3vDR8Iqd4HPc0bkMgz6LhEbS9fBDA3/yXmNXYoGVXACfNrUw==
X-Gm-Message-State: AOJu0YyJpAc7kSePP1InlXd3MHDkT0cBGQrvNfwgpW+FOXBOH7hlNEeq P2yOEZkHmTUZBBg7MVj4lJKwW3fg38nFGCov1msfdhRTCgoGs1tQEnZt+V8DPasLgvctSoSRIzb 2wTc8WStqPo0mLA3/L4sLvvkVREzypA==
X-Google-Smtp-Source: AGHT+IEa6Te7+1mGz+R4386p/CT6RJOFmLJ6pRUfFBq2TX3TV4fhfdwK8zsJy/CZvTeJt+jRkeaJs0W+Fk9Z6e6tLzU=
X-Received: by 2002:a05:6402:51d3:b0:58e:373a:26a7 with SMTP id 4fb4d7f45d1cf-594ba0cbb90mr5219380a12.13.1720653438461; Wed, 10 Jul 2024 16:17:18 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP-UABAOrJK29dU0bSz-SnZCTAGTTJvF2sYrVcZqdZebng@mail.gmail.com> <SJ0PR02MB74391EDA646CF1924ED6328BB7A42@SJ0PR02MB7439.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB74391EDA646CF1924ED6328BB7A42@SJ0PR02MB7439.namprd02.prod.outlook.com>
From: Giuseppe De Marco <demarcog83@gmail.com>
Date: Thu, 11 Jul 2024 01:17:04 +0200
Message-ID: <CAP_qYymBf_Zum8A5+Lyxhq7hfXYWy2KJBnwSM-sgrbPV8gf==g@mail.gmail.com>
To: Michael Jones <michael_b_jones@hotmail.com>
Content-Type: multipart/alternative; boundary="000000000000fb2bbe061cecd8fc"
Message-ID-Hash: LUX6QJ64URVJW6KGQH5LNPXHYSI6CIME
X-Message-ID-Hash: LUX6QJ64URVJW6KGQH5LNPXHYSI6CIME
X-MailFrom: demarcog83@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: OAuth 2.0 Protected Resource Metadata - Implementations
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/DseIVT78x8TSpdiXZyZ9f-Z0eTw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
Hi This Is not the first time I support this draft and say that, two years ago, I was looking for an RS metadata scheme for the spid attribuite authorities specification I found Mike's I-D and considered the deadline I had, together with other collegues of other national agencies, we decided to use It. More than two years are passed from that time. The oauth protected resource metadata was also distributed in the federation trust chains It works, It clearly defines how an RS should present its metadata for interoperability, I believe that It represents an important resource for architects and developers, I support It as I consider It a consolidated approach from my experience Il mer 10 lug 2024, 19:43 Michael Jones <michael_b_jones@hotmail.com> ha scritto: > OpenID Federation implementations use the Protected Resource Metadata > definitions in this specification. Among others, Connect2ID and Authlete > have OpenID Federation implementations. I know that it’s deployed in the > Italian SPID CIE national federation. > > > > -- Mike > > > > *From:* Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com> > *Sent:* Wednesday, July 10, 2024 7:35 AM > *To:* oauth <oauth@ietf.org> > *Subject:* [OAUTH-WG] OAuth 2.0 Protected Resource Metadata - > Implementations > > > > All, > > As part of the shepherd write-up for the OAuth 2.0 Protected Resource > Metadata document, we are looking for information about implementations of > this draft. > https://www.ietf.org/archive/id/draft-ietf-oauth-resource-metadata-06.html > > > Please, reply on the mailing list with any implementations that you are > aware of to support this document. > > Regards, > Rifaat > > > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-leave@ietf.org >
- [OAUTH-WG] OAuth 2.0 Protected Resource Metadata … Rifaat Shekh-Yusef
- [OAUTH-WG] Re: OAuth 2.0 Protected Resource Metad… Michael Jones
- [OAUTH-WG] Re: OAuth 2.0 Protected Resource Metad… Matt Harrell
- [OAUTH-WG] Re: OAuth 2.0 Protected Resource Metad… Atul Tulshibagwale
- [OAUTH-WG] Re: OAuth 2.0 Protected Resource Metad… Giuseppe De Marco