The protocol defines 4 roles:
+--------+ +--------+
| | | |
| <--sign request--| |
| Wallet | | |
| | | |
| |---signature----> |
+--------+ | | +-------------+
| Client |----signature-------> |
| | | Auth Server |
| | | |
+ | <---access token-----| |
| | +-------------+
| |
| | +-------------+
| |---access token-----> |
| | | Resource |
| | | Server |
| <-protected resource-| |
| | +-------------+
| |
+--------+
The abstract protocol flow illustrated above describes the interaction between the four roles and includes the following steps:
The authentication utilizes one external server endpoint (HTTP resource): Token endpoint