You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For permissions I am currently thinking there are 3 plus the defacto "none": read, write, confirm. Where read is basically login, write is manage aliases, and confirm is 2fa. We can model this as a bitmask a la linux modes.
idWarrant
add mode and allAlias to idWarrant
add publicKey to idWarrant
api
add notifier methods
add ability for user to get all aliases
question: how does this work for 2fa alias where the “credential” is actually a secret seed
may need a new column named “confirmSeed” which is never part of public responses
how does api look like? can we work this in with onIdWarrant. Perhaps onAuth(idWarrant, aliases)
store unverified credentials (with verified: false column)
implement sous-temp core api accessToken
something like { idWarrant, roles }
publicKey
do we:
lock the publicKey to a session (store in db)?
allow publicKey to change on refreshIdWarrant
add publicKey on the initial idWarrant, and then after carry the same pub key to each refreshed warrant
The text was updated successfully, but these errors were encountered:
db
mode
read, write, confirm
. Where read is basically login, write is manage aliases, and confirm is 2fa. We can model this as a bitmask a la linux modes.idWarrant
api
onIdWarrant
. PerhapsonAuth(idWarrant, aliases)
publicKey
do we:
The text was updated successfully, but these errors were encountered: