Skip to main content

Decentralized Service Architecture for OAuth2.0

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Thomas Hardjono
Last updated 2018-09-26 (Latest revision 2018-03-25)
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This document proposes an alternative service architecture for user- centric control of the sharing of resources following the UMA model, such as personal data, using the decentralized peer-to-peer computing paradigm. The term 'control' is used here to denote the full capacity of the user to freely select (i) the entities with whom to share resources (e.g. data), and (ii) the entities which provide services implementing user-controlled resource sharing. The peer-to- peer service architecture uses a set of computing nodes called OAuth2.0 Nodes (ON) that are part of a peer-to-peer network as the basis for the decentralized service architecture.


Thomas Hardjono

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)