non-normative examples for openID Authentication 2.0

Jason Sachs jmsachs at gmail.com
Fri Feb 1 15:52:28 UTC 2008


Are there any non-normative examples somewhere for openID
Authentication 2.0showing what transactions should be taking place at
various stages of the
protocol, for its major variants? The spec is somewhat confusing at times &
it is difficult to figure out what I'm doing right or wrong without some
good examples.

The examples in Appendix A of the spec itself are rather slim.

Jason Sachs
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs/attachments/20080201/8b3b765f/attachment-0001.htm>


More information about the specs mailing list