Skip to content

Commit 4ff38e4

Browse files
committed
fix for issue 117
1 parent 513ebdd commit 4ff38e4

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ The Remote Attestation Procedures (RATS) architecture defined by {{RFC9334}} has
154154

155155
# Client Attestation Format
156156

157-
This draft introduces the concept of client attestations to the OAuth 2 protocol, using two JWTs: a Client Attestation and a Client Attestation Proof of Possession (PoP). The primary purpose of these JWTs is to authenticate the Client Instance. These JWTs can be transmitted via HTTP headers in an HTTP request (as described in [](#headers)) from a Client Instance to an Authorization Server or Resource Server, or via a concatenated serialization (as described in [](#alternative-representation)) to enable usage outside of the traditional OAuth2 ecosystem .
157+
This draft introduces the concept of client attestations to the OAuth 2 protocol, using two JWTs: a Client Attestation and a Client Attestation Proof of Possession (PoP). The primary purpose of these JWTs is to authenticate the Client Instance. These JWTs can be transmitted via HTTP headers in an HTTP request (as described in [](#headers)) from a Client Instance to an Authorization Server or Resource Server, or via a concatenated serialization (as described in [](#alternative-representation)) to enable usage outside of OAuth2 based interactions.
158158

159159
## Client Attestation JWT {#client-attestation-jwt}
160160

@@ -542,6 +542,7 @@ This section requests registration of the following scheme in the "Hypertext Tra
542542
* improve introduction
543543
* rename client backend to client attester
544544
* fix missing typ header in examples
545+
* clarify usage of client attestation outside of oauth2 applications
545546

546547
-04
547548

0 commit comments

Comments
 (0)