Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

System Rules v 1.2 of the Muni-ID trust federation #2

Open
wants to merge 13 commits into
base: master
Choose a base branch
from

Conversation

EvanAbsher
Copy link

  • Includes MiTRE OIDC language
  • Includes MIT Oauth2 Language
  • Still needs Section 1.3 work
  • Still Needs More examples of Standard Claims

dazzaji and others added 13 commits April 16, 2015 17:13
This is the first swipe at the System Rules for the Muni-ID UMKC/KCMO
Project. I need more understanding on the tech side of things to draft
a more comprehensive document.
Here is v 1.2 of the model rules. No additional work on section 1.3,
which needs to be done.
Discovered that a party can be a white party for some transactions and
grey for others.
How parties are classified in the Trust Federation should be determined
on both the characteristic of the party and the transaction.
Just fixed some typos
Added examples of claims that a Muni-ID IdP could support in the use
case of a citizen applying for a Kansas City Employee Liquor Permit.
Changing the format
Format
Format
Format
Format
@dazzaji
Copy link
Member

dazzaji commented Mar 18, 2016

Sorry everybody - didn't realize there were open pull requests from last year after contributions largely migrated to neutral open organizations (CollabX, OpenCollab, etc). am going through and merging all the open pull requests now.

@dazzaji dazzaji closed this Mar 18, 2016
@dazzaji dazzaji reopened this Mar 18, 2016
@dazzaji dazzaji mentioned this pull request Mar 18, 2016
dazzaji pushed a commit that referenced this pull request May 9, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants