Goal
Ship a hosted authsome deployment where multiple users can safely use a shared daemon, authenticate with DID-backed proof-of-possession requests, keep credentials isolated, share server-owned OAuth app credentials, and optionally use a server-side hosted proxy.
Status
Blocked. This epic should not be implemented until the prerequisite identity, profile, storage, OAuth client-scope, and session-safety issues are complete.
Prerequisites
In Scope
- Hosted daemon with authenticated CLI/proxy callers
- Request-scoped identity from verified DID/PoP JWT
- Per-user credential isolation
- Server-scoped OAuth client credentials
- Session ownership checks
- Hosted proxy design and implementation if hosted proxy is part of the first hosted release
Out of Scope
- Passport registration
- Shared profile delegation
- Postgres storage backend unless a separate issue promotes it
- KEK/DEK passphrase wrapping unless required by deployment policy
Acceptance Criteria
- Missing or invalid caller proof is rejected for credential-touching routes
- Two users cannot read or mutate each other's credentials or sessions
- OAuth client credentials are shared server-wide, not user-scoped
- Local single-user mode still works
- Hosted deployment docs describe setup, trust model, proxy mode, and known limitations
Notes
This issue intentionally sits above #236. #236 owns the DID-backed identity/profile change; this epic tracks the broader hosted product shape across identity, storage, OAuth client scope, session security, and proxy operations.
Goal
Ship a hosted authsome deployment where multiple users can safely use a shared daemon, authenticate with DID-backed proof-of-possession requests, keep credentials isolated, share server-owned OAuth app credentials, and optionally use a server-side hosted proxy.
Status
Blocked. This epic should not be implemented until the prerequisite identity, profile, storage, OAuth client-scope, and session-safety issues are complete.
Prerequisites
In Scope
Out of Scope
Acceptance Criteria
Notes
This issue intentionally sits above #236. #236 owns the DID-backed identity/profile change; this epic tracks the broader hosted product shape across identity, storage, OAuth client scope, session security, and proxy operations.