m-ld / timeld

Live shared timesheets
MIT License
1 stars 1 forks source link

Empower Gateway to sign messages on behalf of timeld CLI instances #93

Closed mcalligator closed 1 year ago

mcalligator commented 1 year ago

When the timeld Gateway is transmitting messages with signatures for integrity and/or non-repudiation to a federated system via its respective Connector, it is necessary that those signatures connote verification of the original messages received by the Gateway's m-ld clone from CLI clones. In other words, the Gateway is regarded as signing messages on behalf of the timeld CLI instances connected to it.

Motivation: it is not feasible for a another federated time-tracking application to directly validate user updates, because it would need to:

Therefore, the Gateway needs to act as their trusted proxy in this regard.

gsvarovsky commented 1 year ago

See #92