Comment by mooreds
14 hours ago
I wrote a post[0] a few years ago about how you basically get OAuth when you start layering security principles (rotation, time limits, central verification) onto API keys.
Turns out those standards writers knew something!
No comments yet
Contribute on Hacker News ↗