We have a situation where a proxy will need to support both key or oauth
for authentication. Not a great situation, we realize. For the external
vendor utilizing key auth, they will have a restricted set of resources
available to them. We still will ...