Email or username:

Password:

Forgot your password?
Top-level
Johannes Ernst

@mariusor so the spec works for you, in the scenario where you control both sides. Which is good to know, but we don’t really need an official standard for that use case :-)
I would suspect that assembling a “full stack” in the c2s scenario is also left as an exercise for the reader, just as in case of s2s.

1 comment
marius

@J12t yes. I think the most that the spec does is to say (and provide a little support) that OAuth2 should be used.

Go Up