Skip to content

Conversation

@joachimvh
Copy link
Contributor

Updates the UMA server to use PAT as identification method for the RS.

The following process should be followed:

  1. RO registers RS on AS. This is doing following the OIDC dynamic client registration format. The RO should identify themselves using the authorization header, the same as for the policy API (OIDC tokens and raw WebID are supported).
  2. The AS returns the id/secret combination.
  3. The RO sends these to the RS. The implementation here makes use of the CSS account system: specific account parameters need to be updated to trigger the changes.
  4. The RS uses these credentials to request a PAT from the AS, using the token endpoint.
  5. The returned token needs to be used when performing a protected operation (registering a resource/requesting a ticket/introspection).

@joachimvh joachimvh force-pushed the feat/literal-identifiers branch from fc988f6 to 1c9cac1 Compare January 7, 2026 13:02
Base automatically changed from feat/literal-identifiers to main January 7, 2026 13:06
@joachimvh joachimvh merged commit 3fc83f4 into main Jan 7, 2026
6 checks passed
@joachimvh joachimvh deleted the feat/pat branch January 7, 2026 13:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants