Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. The host received metadata of the AM like OAuth 2.0 endpoints
  2. The host received an OAuth access token in order to verify requester access tokens in step 3 and as a representation of the user's decision to
  3. The AM recoived received a list of protected resources on the host it is supposed to authorize on behalf of the user.

The following sub steps are performed in order to fulfill these requirements:

  1. The host looks up the authorization manager metadata and learns about API endpoints and formats supported by the AM
  2. The host obtains OAuth client credentials and a the location of the resource registration API from the authorization manager.
  3. The host obtains an access token from the authorization manager by following the OAuth 2.0 web server flow.
  4. The host registers the authorization user's resources with the AM by using the resource registration API.

host looks up the authorization manager metadata

...