What about the issues of forwardable, and proxiable credentials?
I could think of certain applications that would make use of
these modes, as well as the simple mutual authentication method
currently in place.
-- Jim
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Jim Doyle Boston University Information Technology
Systems Analyst/Programmer Distributed Systems Group tel: 617-353-8248
email: jrd@bu.edu fax: 617-353-6260
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++--+-+-+-+-+-+-