Skip to content

Commit 1469e83

Browse files
authored
remove extra parens
1 parent 4d57faa commit 1469e83

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

draft-ietf-oauth-first-party-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ In this case, the client is expected to initiate a new OAuth
443443
Authorization Code flow with PKCE according to {{RFC6749}} and {{RFC7636}}.
444444

445445
If the client expects the frequency of this error response to be high,
446-
the client MAY include a PKCE ({{RFC7636}}) `code_challenge` in the initial authorization
446+
the client MAY include a PKCE {{RFC7636}} `code_challenge` in the initial authorization
447447
challenge request. This enables the authorization server to essentially treat
448448
the authorization challenge request as a PAR {{RFC9126}} request, and
449449
return the `request_uri` and `expires_in` as defined by {{RFC9126}} in the error response.
@@ -604,7 +604,7 @@ Proof-of-Possession techniques constrain tokens by binding them to a cryptograph
604604

605605
### DPoP: Demonstrating Proof-of-Possession
606606

607-
DPoP ({{RFC9449}}) is an application-level mechanism for sender-constraining OAuth {{RFC6749}} access and refresh tokens. If DPoP is used to sender constrain tokens, the client SHOULD use DPoP for every token request to the Authorization Server and interaction with the Resource Server.
607+
DPoP {{RFC9449}} is an application-level mechanism for sender-constraining OAuth {{RFC6749}} access and refresh tokens. If DPoP is used to sender constrain tokens, the client SHOULD use DPoP for every token request to the Authorization Server and interaction with the Resource Server.
608608

609609
DPoP includes an optional capability to bind the authorization code to the DPoP key to enable end-to-end binding of the entire authorization flow. Given the back-channel nature of this specification, there are far fewer opportunities for an attacker to access the authorization code and PKCE code verifier compared to the redirect-based Authorization Code Flow. In this specification, the Authorization Code is obtained via a back-channel request. Despite this, omitting Authorization Code binding leaves a gap in the end-to-end protection that DPoP provides, so DPoP Authorization Code binding SHOULD be used.
610610

0 commit comments

Comments
 (0)