Skip to content

epic: hosted authsome with DID identity and hosted proxy #239

@manojbajaj95

Description

@manojbajaj95

Goal

Ship a hosted authsome deployment where multiple users can safely use a shared daemon, authenticate with DID-backed proof-of-possession requests, keep credentials isolated, share server-owned OAuth app credentials, and optionally use a server-side hosted proxy.

Status

Blocked. This epic should not be implemented until the prerequisite identity, profile, storage, OAuth client-scope, and session-safety issues are complete.

Prerequisites

In Scope

  • Hosted daemon with authenticated CLI/proxy callers
  • Request-scoped identity from verified DID/PoP JWT
  • Per-user credential isolation
  • Server-scoped OAuth client credentials
  • Session ownership checks
  • Hosted proxy design and implementation if hosted proxy is part of the first hosted release

Out of Scope

  • Passport registration
  • Shared profile delegation
  • Postgres storage backend unless a separate issue promotes it
  • KEK/DEK passphrase wrapping unless required by deployment policy

Acceptance Criteria

  • Missing or invalid caller proof is rejected for credential-touching routes
  • Two users cannot read or mutate each other's credentials or sessions
  • OAuth client credentials are shared server-wide, not user-scoped
  • Local single-user mode still works
  • Hosted deployment docs describe setup, trust model, proxy mode, and known limitations

Notes

This issue intentionally sits above #236. #236 owns the DID-backed identity/profile change; this epic tracks the broader hosted product shape across identity, storage, OAuth client scope, session security, and proxy operations.

Metadata

Metadata

Assignees

No one assigned

    Labels

    ready-for-humanRequires human implementationroadmapPlanned for a future version

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions