Should we build end-point authentication into apps, or is
this something better handled by a dedicated protocol that runs out-of-band
with respect to the apps?
E-mail feedback is welcome, and I’m hoping this point
is covered by one of the presentations at the meeting.
Alper