@techreport{hardt-xauth-protocol-14, number = {draft-hardt-xauth-protocol-14}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-hardt-xauth-protocol/14/}, author = {Dick Hardt}, title = {{The Grant Negotiation and Authorization Protocol}}, pagetotal = 42, year = 2020, month = aug, day = 15, abstract = {Client software often desires resources or identity claims that are independent of the client. This protocol allows a user and/or resource owner to delegate resource authorization and/or release of identity claims to a server. Client software can then request access to resources and/or identity claims by calling the server. The server acquires consent and authorization from the user and/or resource owner if required, and then returns to the client software the authorization and identity claims that were approved. This protocol may be extended on many dimensions.}, }