Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
9dev
64 days ago
|
parent
|
context
|
favorite
| on:
SSH3: Faster and rich secure shell using HTTP/3
That, or the SSH client opens a separate connection to the authorization server and polls for the session state until the user has completed the process; that would be the device code grant, which would solve this scenario just fine.
eqvinox
64 days ago
[–]
You're both talking about web authentication, not HTTP authentication. cf.
https://news.ycombinator.com/item?id=45399594
Denvercoder9
63 days ago
|
parent
[–]
Only to obtain the token, the actual connection itself uses HTTP authentication (Bearer scheme).
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: