[OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
Chris Keogh <christopher.keogh@gmail.com> Mon, 09 February 2026 21:16 UTC
Return-Path: <christopher.keogh@gmail.com>
X-Original-To: oauth@mail2.ietf.org
Delivered-To: oauth@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id EC1DEB4595D0 for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 13:16:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S9-6JjC9MGUv for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 13:16:31 -0800 (PST)
Received: from mail-yx1-xb131.google.com (mail-yx1-xb131.google.com [IPv6:2607:f8b0:4864:20::b131]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 9F495B4595BB for <oauth@ietf.org>; Mon, 9 Feb 2026 13:16:31 -0800 (PST)
Received: by mail-yx1-xb131.google.com with SMTP id 956f58d0204a3-649e97f1e1eso3971195d50.1 for <oauth@ietf.org>; Mon, 09 Feb 2026 13:16:31 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; t=1770671791; cv=none; d=google.com; s=arc-20240605; b=lmIERW3XnDaokfF2KIOk/qQZAS1Ta37aRqvKOMYhZ9vSR7ws82QjeIcOX0+irMgphj 6SxSwbZl+ZlvN68ZzV+0V1oqi3YFJkr+0em2684Fp+xUx4/j6gyqG5v0PdDE7xHqHIUf Vb7qOFS2/Z4mFilSFxzMoevuwha00tVn1sMzAS4lSRknF4ToeMz6pYN3hV4BMO9G8aGC 8v7zTIKVrZmSUQPfH6GpQzed72ZwyH44acUQcoJ3IhaIBHe2Jhu7JgIMVCdt9GKfIpSx gFEQhmJOC3Wrd8JeKZ7EDOik2GVtaFxIxJK4eCgZ+ZDtlRgAWJa+9UrfbnUfua3GrkWA oRaQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=EufG3zcIgXUR3cW4BU+faSXNO1H6yQtNazz33QGUswY=; fh=HRwJNtTTtPgtfgvXyPaPq+Te1JrkxlJZMfmgN30AIzQ=; b=SDOx+PW6hlCiiWu8KU3BH1qCeO0D87dOucg0yaVl+L6VwYm6mx4ulQOWnJQWYfUKqL pgLRHBefDwsMtmR/mVQ1y3WX9D6DTmVnU3ih6iMYSIQC6zXMDMvj1EFSGtKihGUqYPX4 AdKPI8JZkP4BQsETjW/UeqUKBjY6SDI7CeIGanGu8uwM+E7xCR/XInLh/SM7YUuW/Abb PbHhixbqgjQIFKuZDlz3Av71Sqq0Fs67ZSKZ9rXanVnFBGOBuJVCb13OCBaW+G8c7You KIrl4HmIgPtk7kNYjkPZDooog2kj9GyTeUP9/S2FOGwmMjRXQvBQpqOdGffcQLop8z+V cKmA==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1770671791; x=1771276591; darn=ietf.org; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=EufG3zcIgXUR3cW4BU+faSXNO1H6yQtNazz33QGUswY=; b=jOD36hwJbKPRyrOES5VmXZ647cLEib+X0XzpR8YxT47rRFUXTGtlGYsh8r0sK8NT4Y qsYjM4qelWwS9cth5/8K53yKHan/KQLDA1Se3kWRD55iggVdY6Wyrp1WTE8Ab9lMOoUs ehzZsPIcal11MKuAffT8o+BvqUjes9/6dQEVpt16ZQchybZL/QChnIMcxCSHkaqSlROx dYQfzdSfYAMhemOxwZ0UOf3ZPiLRa6+EVnbMsOXHuUrwPK8jvQwl6kjVZQmUmbpWPU7n 57XrV7nB9/u6RarWzEzhGL8q5ZPTX8l6eVJk8zIEt/zZ8bm+mSb4tXRN9U7yC1X1VGnL fzfA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770671791; x=1771276591; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=EufG3zcIgXUR3cW4BU+faSXNO1H6yQtNazz33QGUswY=; b=jSlgjVmUrEPTMmLCXf1UfvFs4gPsWjF49B2u7Y717V1807D2UUJhvIoeKVzJF60Ny3 zBlo+iQMwy1xDz6qHRraOb3J5nHv83uQS/Qw7jiYOHK6nGLJfztx0NkpTIs0PcwHHjAl x1IMzjJFs163BHksvm+85GguezyH3hGtlrO+uE5WJ26k0AedO7NIs42KLZkioRKtJB2m Vbc7d8Xkp7+IEpmpKogQ2m5JZtzemlh4Ulwd/Wf92Jw9r/Grg2jQoo1CQpqGbZgw/ZlF DTEAEXMsOIpwdXOSRIZNEWYrDIUB6kU69GYpZII7qtkoJc7ygbx1KLOt6c3Q69IC/1Sl r1kQ==
X-Gm-Message-State: AOJu0YxiUco9JsffrDBWf8z8X465p08AxS/y0rbkllPjrN2PLcfathBO Ycw/uPhcEUK040/PwKZwOblJZtR6xnE4U5kVwPZP+vVk0oqN/cMBkgv3FivT/TxgkG6E4FeqSjT /SoS+ASSaOV4Hs4cLsOw4aTS3Yn8aHwTS83iG
X-Gm-Gg: AZuq6aJHjIqUd7bLD5IPDlT78pMSrXSJZrVy0WH4PJfc1B2cjTQH8R1VWr54gltE7ZK qjDFgHAcU9ah0oBLnhfwtUWFJmvUlVmGX6V/JQDcWdUo+VvBHzO3gTpPgc7DQQIOTr+sC4etHEL FoZqJNxuCpGPm3LnxhnkRRe1dQEksq/wQlfgSq85vSQxCgoGxFRx5sBDoIUu6lFW9DyfEVqRnro CQNC/UhPf0DpaAq3Y+akTe22Ak3/ZfScX41/GTlEi+PcQMqx5alW0ri9W1i2m5LTCKM6OzTCtFx mAbMltJ+C6Z+dU8vU8/jJhjRnS2/5Eui9jtdmdqp
X-Received: by 2002:a05:690e:4085:b0:64a:db22:1cef with SMTP id 956f58d0204a3-64adb221f23mr5790603d50.42.1770671790698; Mon, 09 Feb 2026 13:16:30 -0800 (PST)
MIME-Version: 1.0
References: <177064881569.2608.14701868528558862560@mail2.ietf.org>
In-Reply-To: <177064881569.2608.14701868528558862560@mail2.ietf.org>
From: Chris Keogh <christopher.keogh@gmail.com>
Date: Tue, 10 Feb 2026 10:16:19 +1300
X-Gm-Features: AZwV_QgKCNWuObQr5VpW3-bQShpWyWJzPP5oYMW5HMmsdIbM6y3C15iCvW_oN1M
Message-ID: <CADo7KwaUWahs-0gO9-D=LHnzWZk08NOkU-Zaiq8T2-uoQFFPSQ@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000193671064a6aa72a"
Message-ID-Hash: MH2L35MP577FBGXWI45ARHHINLZCADGN
X-Message-ID-Hash: MH2L35MP577FBGXWI45ARHHINLZCADGN
X-MailFrom: christopher.keogh@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/NBpFBi9xibypVYhHke0tWphB9hs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
Hi there all, I'm dealing with a similar scenario that Tarun is highlighting and thought I'd chime in to make it more concrete. We have a mobile application and a web application that both use the same IdP/AS. The mobile client (public+PKCE) uses long lived refresh tokens and only requires the user to log in once (via the system browser) to retrieve the access/refresh token combination. From this point on the user is considered signed in to the mobile application, but the session at the IdP will quickly expire (and the session/auth cookie in the system browser with it). We'd like to be able to embed web views within the mobile application that are hosted by our web app without the user having to sign in again. I've been thinking about using something along the lines of Identity chaining or JWT authorization (with DPoP) to retrieve one time use short lived access tokens that can be used by the mobile client to query an endpoint which signs the user in and returns the contents of the IdP session cookies to the mobile application, which then injects the cookies into an embedded browser (not the system browser) which then loads the web view which goes through the standard auth code flow. As Tarun points out, it feels like there's a gap in the standards where this kind of thing isn't really addressed. Potentially it's more of an OIDC problem? On Tue, 10 Feb 2026 at 03:54, <oauth-request@ietf.org> wrote: > Send OAuth mailing list submissions to > oauth@ietf.org > > To subscribe or unsubscribe via email, send a message with subject or > body 'help' to > oauth-request@ietf.org > > You can reach the person managing the list at > oauth-owner@ietf.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of OAuth digest..." > > Today's Topics: > > 1. Re: Feedback on ID-JAG same IdP prohibition - Application to > Application Delegation > (Pieter Kasselman) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Mon, 9 Feb 2026 14:53:14 +0000 > From: Pieter Kasselman <pieter@defakto.security> > Subject: [OAUTH-WG] Re: Feedback on ID-JAG same IdP prohibition - > Application to Application Delegation > To: Tarun Nanduri <tarunnanduri7@gmail.com> > Cc: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, > oauth@ietf.org > Message-ID: > < > CALtWOA1KWhq8diBTA9J52GcGqHNHQgEL+oWfJY9SJL_DPiqf0g@mail.gmail.com> > Content-Type: multipart/alternative; > boundary="0000000000000d50df064a654dc1" > > Hi Tarun, for the original use case you described, you may want to consider > the transaction token spec [1]. > > It was specifically developed to allow authorization context, including > user and workload/microservice identity information, to be passed between > microservices within a domain, without having to pass around access tokens. > > Cheers > > Pieter > > [1] > https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/07/ > > On Sun, Feb 8, 2026 at 8:02 AM Tarun Nanduri <tarunnanduri7@gmail.com> > wrote: > > > Hi Pieter, Brian, Aaron, and the WG, > > > > Thanks for the feedback and for taking the time to look at this. I’ve > been > > thinking over the points about Section 8.3 and the general intent of > ID-JAG. > > > > Stepping back from the specific spec for a second, it feels to me like we > > have a bit of a gap in the OAuth/OIDC specifications. We’re essentially > > looking for a standard way to do Directed Session Transfer, in > environments > > where shared cookies/SSO just aren't an option for security reasons. > > > > You pointed toward the Identity Chaining Across Domains draft as the > > intended home for this, and I see the logic—since the AS in Domain A > > generates the JWT grant, it handles the "identity proof" part of the > > handover. > > > > But right now, if I want to move a user from App A to App B without a > > fresh login, the options still feel a bit thin: > > > > - Standard SSO is off the table because of the "no-shared-cookie" > > constraint. > > - RFC 8693 is a great building block, but it’s mostly used for > > service-to-service backend swaps. There isn't really a front-channel > > "profile" for this (as RFC863 sends back a usable token rather than an > > assertion). > > - Identity Chaining, as Brian mentioned, is explicitly a specification > > for cross-domain use. > > > > > > It feels a bit ironic that the protocol makes "Cross-Domain" identity > > transfers standardized via ID-JAG (as an OAuth native grant), but leaves > > "Intra-Domain" delegation as a "roll-your-own" exercise. Without a > standard > > profile for this, people might just end up building non-standard hacks > > which is exactly what we’re trying to avoid. > > > > I’m not trying to force a change to ID-JAG if the WG feels it’s the wrong > > home, but I am curious: > > > > - Do we think this "Directed Session transfer" pattern is a gap worth > > filling? > > > > It feels to me like there should be an "OAuth-native" way to do this that > > has the right guardrails (audience binding, act claims, etc.) to make it > > secure in a Zero Trust setup, but is as straightforward to implement as a > > basic Auth Code grant. I’d love to hear if anyone else sees this gap, or > if > > there's a pattern I’m missing that doesn't involve a lot of custom "glue" > > code. > > > > Best Regards, > > Tarun Nanduri. > > > > On Thu, Feb 5, 2026 at 6:14 PM Pieter Kasselman <pieter@defakto.security > > > > wrote: > > > >> Hi Tarun > >> > >> I agree with Brain and Aaron that your use case can likely be addressed > >> by the Identity and Authorization Chaining Across Domains draft [1]. You > >> could always profile it further if needed. Is there a reason you would > not > >> be able to use that draft? > >> > >> Cheers > >> > >> Pieter > >> > >> [1] > https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/ > >> > >> On Wed, Feb 4, 2026 at 9:31 PM Brian Campbell <bcampbell= > >> 40pingidentity.com@dmarc.ietf.org> wrote: > >> > >>> Hi Tarun, > >>> > >>> As Aaron mentioned there are less tightly profiled variations of this > >>> general flow, like oauth-identity-chaining > >>> <https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/> > >>> or rfc8693 <https://datatracker.ietf.org/doc/html/rfc8693> + rfc7523 > >>> <https://datatracker.ietf.org/doc/html/rfc7523> together directly, > that > >>> don't have the same constraint regarding the IDP not issuing access > tokens > >>> in response to an ID-JAG it issued itself. Perhaps that might meet your > >>> needs? Although those are intended for cross domain as well. Honestly, > much > >>> of this seems like more than is needed for a same idp / same domain > case. > >>> > >>> On Tue, Feb 3, 2026 at 8:13 PM Tarun Nanduri <tarunnanduri7@gmail.com> > >>> wrote: > >>> > >>>> Dear Aaron, > >>>> > >>>> I am awaiting your feedback on this. To summarize, > >>>> > >>>> When an Identity Provider (IdP) does not support Single Sign-On (SSO) > >>>> due to the nature of the systems involved, and a user needs to > transfer > >>>> their session to another application without re-logging in, I feel > ID-JAG > >>>> offers a secure and seamless solution, providing a smooth user > experience. > >>>> > >>>> The RFC, as stated in previous emails, explicitly prohibits using the > >>>> specification within the same IdP. Considering the zero-trust model > >>>> typically applied within the same IdP, are we open to modifying the > >>>> specification to allow its implementation within such environments? > >>>> > >>>> Best Regards, > >>>> Tarun Nanduri. > >>>> > >>>> On Fri, Dec 5, 2025 at 8:46 AM Tarun Nanduri <tarunnanduri7@gmail.com > > > >>>> wrote: > >>>> > >>>>> Hi Aaron, > >>>>> > >>>>> Thanks for the response, and pointing me to the Identity Chaining > >>>>> draft. However, after looking at it, I don't think it applies to the > >>>>> use-case I shared above (please feel free to correct here). It looks > like > >>>>> it's designed for cross-domain scenarios* whereas the use-case I > >>>>> shared above has*, > >>>>> > >>>>> - Both the clients are in same trust domain > >>>>> - We have single authorization server (it's the IdP too) > >>>>> > >>>>> The challenge we are trying to solve is, > >>>>> > >>>>> - Client A needs to transfer user session to client B > >>>>> - WITHOUT Client A sharing its access token with client B > >>>>> (security risk due to token exposure, invalid audience, > unnecessary > >>>>> privileges etc.) > >>>>> - Both clients trust the same IdP > >>>>> > >>>>> This is why we're intending to use RFC8693, but it still requires > >>>>> client A to send access token (after token exchange) to client B > which > >>>>> creates exposure we're trying to avoid. The ID-JAG pattern > (cryptographic > >>>>> proof of identity, not a usable token) would be perfect, except the > >>>>> prohibition defined in section 8.3 of Identity Assertion draft: > >>>>> 8.3. > >>>>> < > https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#section-8.3 > >Cross-Domain > >>>>> Use > >>>>> < > https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#name-cross-domain-use > > > >>>>> > >>>>> This specification is intended for cross-domain uses where the > Client, > >>>>> Resource App, and Identity Provider are all in different trust > domains. In > >>>>> particular, the Identity Provider MUST NOT issue access tokens in > >>>>> response to an ID-JAG it issued itself. Doing so could lead to > >>>>> unintentional broadening of the scope of authorization. > >>>>> My question remains, Can the section 8.3 prohibition be satisfied > with > >>>>> enough security controls (scope validation, replay prevention etc.) > for > >>>>> same IdP scenarios, or is it a hard limitation? > >>>>> > >>>>> Thanks and Regards, > >>>>> Tarun Nanduri. > >>>>> > >>>>> > >>>>> On Fri, Dec 5, 2025 at 1:53 AM Aaron Parecki <aaron@parecki.com> > >>>>> wrote: > >>>>> > >>>>>> Hi Tarun, > >>>>>> > >>>>>> It sounds like what you are looking for is the parent draft of this > >>>>>> draft, Identity and Authorization Chaining Across Domains: > >>>>>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/ > >>>>>> > >>>>>> The document that defines the ID-JAG, Identity Assertion > >>>>>> Authorization Grant, is a special case of Identity Chaining where > both the > >>>>>> client and resource have a pre-existing relationship with the same > IdP. So > >>>>>> I don't view it as a limitation, it's actually an optimization when > there > >>>>>> is a common IdP. The Identity Chaining draft is the same as this > draft > >>>>>> except it doesn't specify the input token format or the reason why > the > >>>>>> client and resource trust the cross-domain JWT issuer. > >>>>>> > >>>>>> Aaron > >>>>>> > >>>>>> > >>>>>> > >>>>>> On Mon, Dec 1, 2025 at 8:11 AM Tarun Nanduri < > tarunnanduri7@gmail.com> > >>>>>> wrote: > >>>>>> > >>>>>>> Dear OAuth Working Group & Aaron, > >>>>>>> > >>>>>>> I would like to provide feedback on the OAuth Identity Assertion > >>>>>>> Authorization Grant (ID-JAG) specification, specifically regarding > >>>>>>> the prohibition against same-IdP usage. > >>>>>>> > >>>>>>> Use Case: > >>>>>>> > >>>>>>> In microservices architectures using the same IdP, there is a > >>>>>>> legitimate need for service-to-service identity delegation WITHOUT > >>>>>>> sharing access tokens directly: > >>>>>>> > >>>>>>> - Application A has a user-scoped token > >>>>>>> - Application A needs to invoke Application B on behalf of user > >>>>>>> - Sharing Token A with Application B creates security risks: > >>>>>>> * Token exposure between services > >>>>>>> * Replay attacks > >>>>>>> * Over-privileged access > >>>>>>> * Audience mismatch > >>>>>>> > >>>>>>> The Gap: > >>>>>>> > >>>>>>> ID-JAG's assertion pattern solves this perfectly: > >>>>>>> - Application A creates a cryptographic identity assertion > >>>>>>> - Assertion is audience-bound to Application B > >>>>>>> - Application B exchanges assertion for its own token > >>>>>>> - No credential sharing between services > >>>>>>> > >>>>>>> However, the same-IdP prohibition prevents this legitimate use > case. > >>>>>>> > >>>>>>> Suggestion: > >>>>>>> > >>>>>>> Consider either: > >>>>>>> 1. Removing the same-IdP prohibition with appropriate security > >>>>>>> guidance > >>>>>>> 2. Adding an exception for service-to-service delegation scenarios > >>>>>>> 3. Providing guidance on how to achieve this pattern within the > same > >>>>>>> IdP > >>>>>>> > >>>>>>> RFC 8693 (Token Exchange) doesn't fully address this use case as it > >>>>>>> requires sending the actual token (subject_token), which is what > >>>>>>> we're > >>>>>>> trying to avoid. > >>>>>>> > >>>>>>> Security Considerations: > >>>>>>> > >>>>>>> With zero-trust validation, same-IdP assertions can be just as > secure > >>>>>>> as cross-IdP: > >>>>>>> - Validate assertion issuer is authorized > >>>>>>> - Apply fresh authorization policy evaluation > >>>>>>> - Enforce audience restrictions > >>>>>>> - Use short-lived assertions > >>>>>>> - Implement scope intersection, not broadening > >>>>>>> > >>>>>>> Would appreciate the working group's consideration of this use > case. > >>>>>>> > >>>>>>> Best regards, > >>>>>>> Tarun Nanduri. > >>>>>>> > >>>>>> _______________________________________________ > >>>> OAuth mailing list -- oauth@ietf.org > >>>> To unsubscribe send an email to oauth-leave@ietf.org > >>>> > >>> > >>> *CONFIDENTIALITY NOTICE: This email may contain confidential and > >>> privileged material for the sole use of the intended recipient(s). Any > >>> review, use, distribution or disclosure by others is strictly > prohibited. > >>> If you have received this communication in error, please notify the > sender > >>> immediately by e-mail and delete the message and any file attachments > from > >>> your computer. Thank you.* > >>> _______________________________________________ > >>> OAuth mailing list -- oauth@ietf.org > >>> To unsubscribe send an email to oauth-leave@ietf.org > >>> > >> > -------------- next part -------------- > A message part incompatible with plain text digests has been removed ... > Name: not available > Type: text/html > Size: 16713 bytes > Desc: not available > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-leave@ietf.org > > > ------------------------------ > > End of OAuth Digest, Vol 208, Issue 19 > ************************************** > -- Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Karl McGuinness
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Atul Tulshibagwale