Hi, Nat Sakimura here. In the last week’s episode, I have explained what are sender constrained tokens But you may wonder where these are going…
View More Where are Sender Constrained Token used in RFC6749?Month: July 2018
2 mintues OAuth: Bearer and Sender Constrained Tokens
In the episode #1, I have explained that OAuth uses metro ticket like “tokens” to access a protected resource. These are called bearer tokens as…
View More 2 mintues OAuth: Bearer and Sender Constrained Tokens[2 minutes OAuth] #1 Basic Concepts
I have started a new Youtube video series to explain the concepts of OAuth 2.0 to non-technical people. The series name is “2 minutes OAuth”.…
View More [2 minutes OAuth] #1 Basic ConceptsCfC: Requirements for Self Sovereign Identity
Main complaints around Self-Sovereign Identity fiasco that I have is that it is at best “Self-sovereign Identifier”. You will see it if you read the W3C…
View More CfC: Requirements for Self Sovereign Identity