You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: openid-sharedsignals-framework-1_0.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -609,7 +609,7 @@ critical_subject_members
609
609
610
610
authorization_schemes
611
611
612
-
> OPTIONAL. A list of JSON objects that specify the supported
612
+
> OPTIONAL. An array of JSON objects that specify the supported
613
613
authorization scheme properties defined in {{authorization-scheme}}. To enable seamless discovery of
614
614
configurations, the service provider SHOULD, with the appropriate
615
615
security considerations, make the authorization_schemes attribute
@@ -620,7 +620,7 @@ TODO: consider adding a IANA Registry for metadata, similar to Section 7.1.1 of
620
620
{{RFC8414}}. This would allow other specs to add to the metadata.
621
621
622
622
### Authorization scheme {#authorization-scheme}
623
-
SSF is an HTTP based signals sharing framework. It is agnostic to the authentication and authorization schemes used to secure stream configuration APIs. It does not provide any SSFspecific authentication and authorization schemes but relies on the cooperating parties' mutual security considerations. The authorization scheme section of the metadata provides discovery information related to the transmitter's stream management APIs.
623
+
SSF is an HTTP based signals sharing framework and is agnostic to the authentication and authorization schemes used to secure stream configuration APIs. It does not provide any SSF-specific authentication and authorization schemes but relies on the cooperating parties' mutual security considerations. The authorization scheme section of the metadata provides discovery information related to the transmitter's stream management APIs.
624
624
625
625
spec_urn
626
626
@@ -1543,9 +1543,9 @@ Errors are signaled with HTTP status codes as follows:
1543
1543
1544
1544
Examples:
1545
1545
1546
-
1. If a Receiver makes a request with an improper authorization, then the
1546
+
1. If a Receiver makes an unauthorized request, then the
1547
1547
Transmitter MUST respond with a 401 error status.
1548
-
2. If the Receiver presents a valid authorization, but the Transmitter policy
1548
+
2. If a Receiver makes an authorized request, but the Transmitter policy
1549
1549
does not permit the Receiver from obtaining the status, then the Transmitter
1550
1550
MAY respond with a 403 error status.
1551
1551
3. If the Receiver requests the status for a stream that does not exist then the
@@ -2143,7 +2143,7 @@ The purpose is defense in depth against confusion with other JWTs, as described
2143
2143
in Sections 4.5 and 4.6 of {{RFC8417}}.
2144
2144
2145
2145
### The "aud" Claim {#aud-claim}
2146
-
The "aud" claim can be a single value (string) or an array of strings. Values that
2146
+
The "aud" claim can be a single string or an array of strings. Values that
2147
2147
uniquely identify the Receiver to the Transmitter MAY be used, if the two parties
0 commit comments