Thank you for presenting your proposal to the group in Brisbane.

Reading through the draft, it seemed that there are really two topics in here, 
and I'm wondering how they could be split:

1, a data structure for complex access rights

2, a cryptographic mechanism for selectively encrypting some of those rights to 
protect them from unintentional audiences.

The data structure used to convey the access rights seems very similar to the 
object structure defined by RAR, RFC9396: https://www.rfc-editor.org/rfc/RFC9396

I was unable to find something in this data structure that is required to 
provide the cryptographic hiding functionality, have I missed something? Or 
would it be possible to apply this to RAR objects?

Does the key distribution happen or of band of the protocol? In the oauth 
world, would these keys become part of the RS configuration?

Thank you,

- Justin
________________________________
From: OAuth <oauth-boun...@ietf.org> on behalf of jiangcheng 
<jiangcheng...@163.com>
Sent: Tuesday, March 19, 2024 9:42 PM
To: OAuth@ietf.org <OAuth@ietf.org>
Cc: zhangjl382 <zhangjl...@chinaunicom.cn>; jill32 <jil...@chinaunicom.cn>
Subject: [OAUTH-WG] draft-zhang-jose-json-fine-grained-access


Dear oauth,



      We have a draft and we are looking forward to soliciting comments on it.

      
https://datatracker.ietf.org/doc/draft-zhang-jose-json-fine-grained-access/


Best regards

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to