Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add access-identity to auth-server.yaml #497

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

desimmons
Copy link

@desimmons desimmons commented Aug 20, 2024

Changes proposed in this pull request

This PR is a proposal for a new grant type: access-identity

Context

As part of the Open Payments community call, the need for a user-authentication grant was identified by two participants. One of the actions from the latest call was to create proposals. This is one such proposal.

TODO

  • Update resource-server.yaml
  • Create basic example docs

Copy link

changeset-bot bot commented Aug 20, 2024

⚠️ No Changeset found

Latest commit: 99edebc

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

Copy link

netlify bot commented Aug 20, 2024

Deploy Preview for openpayments-preview canceled.

Name Link
🔨 Latest commit 99edebc
🔍 Latest deploy log https://app.netlify.com/sites/openpayments-preview/deploys/66c47fa8157fb80008b16745

@@ -375,6 +376,27 @@ components:
- type
- actions
- identifier
access-identity:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Based on the discussion from the Open Payments Community call, this would also require an additional property that will need to be provided - the user wallet address. This way, the wallet provider can validate if the connected user (on their side) is the owner of the wallet address when the user is redirected to the IdP page.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants