Thank you for presenting your proposal to the group in Brisbane. Reading through the draft, it seemed that there are really two topics in here, and I'm wondering how they could be split:
1, a data structure for complex access rights 2, a cryptographic mechanism for selectively encrypting some of those rights to protect them from unintentional audiences. The data structure used to convey the access rights seems very similar to the object structure defined by RAR, RFC9396: https://www.rfc-editor.org/rfc/RFC9396 I was unable to find something in this data structure that is required to provide the cryptographic hiding functionality, have I missed something? Or would it be possible to apply this to RAR objects? Does the key distribution happen or of band of the protocol? In the oauth world, would these keys become part of the RS configuration? Thank you, - Justin ________________________________ From: OAuth <oauth-boun...@ietf.org> on behalf of jiangcheng <jiangcheng...@163.com> Sent: Tuesday, March 19, 2024 9:42 PM To: OAuth@ietf.org <OAuth@ietf.org> Cc: zhangjl382 <zhangjl...@chinaunicom.cn>; jill32 <jil...@chinaunicom.cn> Subject: [OAUTH-WG] draft-zhang-jose-json-fine-grained-access Dear oauth, We have a draft and we are looking forward to soliciting comments on it. https://datatracker.ietf.org/doc/draft-zhang-jose-json-fine-grained-access/ Best regards
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth