Hi Johannes How would you incorporate the user assent into the flow of these tools? Seems it would be... congruent to the usage?
If you actualize authorization assent outside the authentication phase, then any tool accessing a resource would be able to participate as long as the provider identifies the accessor and also verifies the accessor's rights to the specific operation on the specific resource. Oh, that sounds complicated, but really isn't. I presented more about this at the IIW See more http://nocrypto.com/wiki/index.php/Authorization Hans On Thu, May 28, 2009 at 11:18 AM, Johannes Ernst <jernst+google....@netmesh.us> wrote: > Any thoughts on how oauth could work for various command-line tools > that today usually need a username and password? > Perhaps even the mysql client? > > Or even better, anybody working on this? > > > > > Johannes Ernst > NetMesh Inc. > > > > > > > http://netmesh.info/jernst > > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "OAuth" group. To post to this group, send email to oauth@googlegroups.com To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/oauth?hl=en -~----------~----~----~----~------~----~------~--~---