The applications we're talking about are **already** doing X.509 when they
make HTTPS connections.  It's not a new requirement.  The only thing we're
doing is using the certificate for JWT instead of HTTPS.

--RLB

On Mon, Jun 10, 2024 at 11:15 PM Michael Jones <michael_b_jo...@hotmail.com>
wrote:

> As both I and Giuseppe pointed out, the requirement for applications to
> use and understand X.509 certificates means that the draft is way beyond
> the minimum complexity needed.
>
>
>
> Eliminate application-level X.509 (which is an anachronism that OAuth and
> JOSE have moved away from), and I’ll support adoption of the next draft.
>
>
>
>                                                                 -- Mike
>
>
>
> *From:* Richard Barnes <r...@ipv.sx>
> *Sent:* Monday, June 10, 2024 8:11 PM
> *To:* Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com>
> *Cc:* oauth <oauth@ietf.org>
> *Subject:* [OAUTH-WG] Re: Call for adoption - PIKA
>
>
>
> In case it's not clear from other messages in this thread: I think this
> draft should be adopted.  It solves several pressing use cases, with the
> minimal amount of complexity needed.
>
>
>
> --Richard
>
>
>
> On Mon, Jun 10, 2024 at 7:47 AM Rifaat Shekh-Yusef <
> rifaat.s.i...@gmail.com> wrote:
>
> All,
>
> This is an official call for adoption for the *Proof of Issuer Key
> Authority (PIKA)* draft:
>
> https://datatracker.ietf.org/doc/draft-barnes-oauth-pika/
>
>
> Please, reply *on the mailing list* and let us know if you are in favor
> or against adopting this draft as WG document, by *June 24th*.
>
> Regards,
>  Rifaat & Hannes
>
>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to