Perfectly appropriate for any identity request for which a RP would accept whatever identity (transferred through an identity protocol or otherwise) the user provided, i.e. any data either
- not used as input to an authorization decision (e.g. some role) or
- not verified somewhere else (e.g. credit card)
No comments:
Post a Comment