Skip to content

Commit 8d65674

Browse files
c2bopaulbastian
andauthored
Apply suggestions from pauls review
Co-authored-by: Paul Bastian <[email protected]>
1 parent 36e2c29 commit 8d65674

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -265,12 +265,12 @@ token68 = 1*( ALPHA / DIGIT / "-" / "." /
265265

266266
It is RECOMMENDED that the authorization server validate the Client Attestation JWT prior to validating the Client Attestation PoP.
267267

268-
## Checking HTTP requests feature client attestations {#checking-http-requests-with-client-attestations}
268+
## Validating HTTP requests feature client attestations {#checking-http-requests-with-client-attestations}
269269

270270
To validate an HTTP request which contains the client attestation headers, the receiving server MUST ensure the following with regard to a received HTTP request:
271271

272272
1. There is precisely one OAuth-Client-Attestation HTTP request header field, where its value is a single well-formed JWT conforming to the syntax outlined in []{client-attestation-jwt}.
273-
2. There is precisely one OAuth-Client-Attestation-PoP HTTP request header field, where its value is a single well-formed JWT conforming to the syntax outlined in []{client-attestation-pop-jwt}.
273+
2. There is precisely one OAuth-Client-Attestation-PoP HTTP request header field, where its value is a single well-formed JWT conforming to the syntax outlined in [](client-attestation-pop-jwt).
274274
3. The signature of the Client Attestation PoP JWT obtained from the OAuth-Client-Attestation-PoP HTTP header verifies with the Client Instance Key contained in the `cnf` claim of the Client Attestation JWT obtained from the OAuth-Client-Attestation HTTP header.
275275

276276
## Client Attestation at the Token Endpoint {#token-endpoint}
@@ -337,7 +337,7 @@ response_type=code&state=af0ifjsldkj&client_id=s6BhdRkqt3
337337

338338
# Concatenated Serialization for Client Attestations {#alternative-representation}
339339

340-
A Client Attestation according to this specification MAY be presented using an alternative representation for cases where the header-based mechanism (as introduced in introduced in []{#headers}) does not fit the underlying protocols, e.g., for direct calls to Browser APIs.
340+
A Client Attestation according to this specification MAY be presented using an alternative representation for cases where the header-based mechanism (as introduced in introduced in [](#headers) does not fit the underlying protocols, e.g., for direct calls to Browser APIs.
341341
In those cases, a concatenated serialization of the Client Attestation and Client Attestation PoP can can be used.
342342

343343
## Concatenated Serialization Format {#format-alternative}
@@ -373,8 +373,8 @@ wvi9RxSMzbIey8GVVQLv9qQrBUqmc1qj9Bs
373373

374374
To validate a client attestation using the concatenated serialization form, the receiving server MUST ensure the following:
375375

376-
1. Before the '~' character, there exists precisely a single well-formed JWT conforming to the syntax outlined in []{client-attestation-jwt}.
377-
2. After the '~' character, there exists precisely a single well-formed JWT conforming to the syntax outlined in []{client-attestation-pop-jwt}.
376+
1. Before the '~' character, there exists precisely a single well-formed JWT conforming to the syntax outlined in [](client-attestation-jwt).
377+
2. After the '~' character, there exists precisely a single well-formed JWT conforming to the syntax outlined in [](client-attestation-pop-jwt).
378378
3. The signature of the Client Attestation PoP JWT obtained after the '~' character verifies with the Client Instance Key contained in the `cnf` claim of the Client Attestation JWT obtained before the '~' character.
379379

380380
# Implementation Considerations

0 commit comments

Comments
 (0)