Since the discussion in the "OAuth after-party" seemed to warrant bringing it 
up, I mentioned the UMA design principles/requirements document.  You can find 
it here:

http://kantarainitiative.org/confluence/display/uma/UMA+Requirements

The discussion is around "Why can't Kerberos just be used for your use cases?"  
The UMA principles might be able to inform how the OAuth WG makes its case for 
why Kerberos doesn't suffice.  (If we discover it does, hey, our work here is 
done. :-)

        Eve

Eve Maler
e...@xmlgrrl.com
http://www.xmlgrrl.com/blog

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to