(no title)
distalx | 7 months ago
It feels like that model handles key management, delegation, and revocation in a well-established way.
What am I missing here that makes this a better fit?
distalx | 7 months ago
It feels like that model handles key management, delegation, and revocation in a well-established way.
What am I missing here that makes this a better fit?
motorest|7 months ago
From a cursory read, the answer is "it doesn't".
The blogger puts up a strawman argument to complain about secret management and downloading SDKs, but the blogger ends up presenting as a tradeoff the need to manage public and private keys, key generation at the client side, and not to mention services having to ad-hoc secret verification at each request.
This is already a very poor tradeoff, but to this we need to factor in the fact that this is a highly non-standard, ad-hoc auth mechanism.
I recall that OAuth1 had a token generation flow that was similar in the way clients could generate requests on the fly with nonces and client keys. It sucked.
distalx|7 months ago