Deauthorization endpoint user identification

Many thanks for your response and suggestion, that sounds like a workable solution.

Best Regards,

Dave