Re: Basic Authentication behavior

>	But my point, from the perspective that IETF WGs should seek
>to generate specifications which yield maximum possible interoperability,
>and include adequately detailed "implementation notes" where there are
>problems, is that you are not adequately taking into account the use of
>templates by a substantial number of deployed UAs.

IETF WGs do not generate specifications; authors do.  If someone can
author up a chunk of text for the Authentication section that describes
how the "http" URL space is treated hierarchically for predetermining
the reusability of credentials within a given realm, and can do so in
a manner less complicated than this sentence, then I am sure Jim can
add it to the Issues list and the matter can be resolved.

....Roy

Received on Monday, 8 September 1997 11:27:41 UTC