%% You should probably cite draft-hardt-xauth-protocol-14 instead of this revision. @techreport{hardt-xauth-protocol-04, number = {draft-hardt-xauth-protocol-04}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-hardt-xauth-protocol/04/}, author = {Dick Hardt}, title = {{The XAuth Protocol}}, pagetotal = 53, year = 2020, month = feb, day = 19, abstract = {Client software often desires resources or identity claims that are independent of the client. This protocol allows a user and/or resource owner to delegate resource authorization and/or release of identity claims to a server. Client software can then request access to resources and/or identity claims by calling the server. The server acquires consent and authorization from the user and/or resource owner if required, and then returns to the client software the authorization and identity claims that were approved. This protocol can be extended to support alternative authorizations, claims, interactions, and client authentication mechanisms.}, }