Skip to content

Commit fb3c058

Browse files
committed
Tim's comments addressed
Tim's comments addressed
1 parent b5f838d commit fb3c058

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

openid-sharedsignals-framework-1_0.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -609,7 +609,7 @@ critical_subject_members
609609

610610
authorization_schemes
611611

612-
> OPTIONAL. A list of JSON objects that specify the supported
612+
> OPTIONAL. An array of JSON objects that specify the supported
613613
authorization scheme properties defined in {{authorization-scheme}}. To enable seamless discovery of
614614
configurations, the service provider SHOULD, with the appropriate
615615
security considerations, make the authorization_schemes attribute
@@ -620,7 +620,7 @@ TODO: consider adding a IANA Registry for metadata, similar to Section 7.1.1 of
620620
{{RFC8414}}. This would allow other specs to add to the metadata.
621621

622622
### Authorization scheme {#authorization-scheme}
623-
SSF is an HTTP based signals sharing framework. It is agnostic to the authentication and authorization schemes used to secure stream configuration APIs. It does not provide any SSF specific authentication and authorization schemes but relies on the cooperating parties' mutual security considerations. The authorization scheme section of the metadata provides discovery information related to the transmitter's stream management APIs.
623+
SSF is an HTTP based signals sharing framework and is agnostic to the authentication and authorization schemes used to secure stream configuration APIs. It does not provide any SSF-specific authentication and authorization schemes but relies on the cooperating parties' mutual security considerations. The authorization scheme section of the metadata provides discovery information related to the transmitter's stream management APIs.
624624

625625
spec_urn
626626

@@ -1543,9 +1543,9 @@ Errors are signaled with HTTP status codes as follows:
15431543

15441544
Examples:
15451545

1546-
1. If a Receiver makes a request with an improper authorization, then the
1546+
1. If a Receiver makes an unauthorized request, then the
15471547
Transmitter MUST respond with a 401 error status.
1548-
2. If the Receiver presents a valid authorization, but the Transmitter policy
1548+
2. If a Receiver makes an authorized request, but the Transmitter policy
15491549
does not permit the Receiver from obtaining the status, then the Transmitter
15501550
MAY respond with a 403 error status.
15511551
3. If the Receiver requests the status for a stream that does not exist then the
@@ -2143,7 +2143,7 @@ The purpose is defense in depth against confusion with other JWTs, as described
21432143
in Sections 4.5 and 4.6 of {{RFC8417}}.
21442144

21452145
### The "aud" Claim {#aud-claim}
2146-
The "aud" claim can be a single value (string) or an array of strings. Values that
2146+
The "aud" claim can be a single string or an array of strings. Values that
21472147
uniquely identify the Receiver to the Transmitter MAY be used, if the two parties
21482148
have agreement on the format.
21492149

0 commit comments

Comments
 (0)