e described inline.
>
>
>
>-- Mike
>
>
>
> *From:* OAuth [mailto:oauth-boun...@ietf.org] *On Behalf Of *Kathleen
> Moriarty
> *Sent:* Saturday, October 29, 2016 3:51 AM
> *To:* oauth@ietf.org
> *Subject:* [OAU
, 2016 3:51 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] AD review of draft-ietf-oauth-amr-values
Hello,
I reviewed draft-ietf-oauth-amr-values and have a few comments. First, thanks
for your work on this draft!
Several of the authentication methods mentioned are typically used (or
recommended for
Hello,
I reviewed draft-ietf-oauth-amr-values and have a few comments. First,
thanks for your work on this draft!
Several of the authentication methods mentioned are typically used (or
recommended for use) as a second or third factor. I see in section 3 that
multiple methods can be contained in