You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
refactor: iterate over access request endpoint API
Ensure timestamp is generated within the server;
Ensure DELETE on access requests can not be executed (who owns an access request?);
iterate over documentation;
Remove duplicated function;
fix tests accordingly
--data-raw '{ "status": "accepted" }' # can be changed to `denied` too.
112
106
```
@@ -116,13 +110,11 @@ After this, the RP will be able to use the resource following the UMA protocol.
116
110
117
111
## Deleting access requests
118
112
119
-
By making a simple **DELETE** request on the `/uma/requests/:id` endpoint, an access request can be deleted.
120
-
The id should be sufficiently encoded in the URL.
113
+
Currently, access requests cannot be deleted. The reason being that it from a governance decision a decision need to be made who is allowed to delete it.
114
+
115
+
Is it the requesting party? Or is it the resource owner?
116
+
From the start. It makes more sense for the RP. However, if the RO made a decision, it does not make sense that the RP can remove this.
0 commit comments