Skip to content

Commit 78ed1e4

Browse files
authored
Merge pull request #120 from oauth-wg/tl/issue-119
Minor tweak to implementation considerations formatting
2 parents 91861b0 + f735b5b commit 78ed1e4

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -460,9 +460,10 @@ Implementers should be aware that the design of this authentication mechanism de
460460

461461
Authorization servers issuing a refresh token in response to a token request using the client attestation mechanism as defined by this draft MUST bind the refresh token to the Client Instance, and NOT just the client as specified in section 6 {{RFC6749}}. To prove this binding, the Client Instance MUST use the client attestation mechanism when refreshing an access token. The client MUST also use the same key that was present in the "cnf" claim of the client attestation that was used when the refresh token was issued.
462462

463-
### Web Server Default Maximum HTTP Header Sizes
463+
## Web Server Default Maximum HTTP Header Sizes
464464

465465
Because the Client Attestation and Client Attestation PoP are communicated using HTTP headers, implementers should consider that web servers may have a default maximum HTTP header size configured which could be too low to allow conveying a Client Attestation and or Client Attestation PoP in an HTTP request. It should be noted, that this limit is not given by the HTTP {{RFC9112}}, but instead web server implementations commonly set a default maximum size for HTTP headers. As of 2024, typical limits for modern web servers configure maximum HTTP headers as 8 kB or more as a default.
466+
466467
## Rotation of Client Instance Key
467468

468469
This specification does not provide a mechanism to rotate the Client Instance Key in the Client Attestation JWT's "cnf" claim. If the Client Instance needs to use a new Client Instance Key for any reason, then it MUST request a new Client Attestation JWT from its Client Attester.

0 commit comments

Comments
 (0)