Skip to content

Commit 8a7c893

Browse files
committed
Merge branch 'main' into rfc9207
2 parents 5656540 + efe91a2 commit 8a7c893

1 file changed

Lines changed: 7 additions & 2 deletions

File tree

index.bs

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -389,7 +389,7 @@ the verifying party MUST follow OpenID Connect Discovery 1.0 [[!OIDC-DISCOVERY]]
389389

390390
When a Client performs an unauthenticated request to a protected resource,
391391
the Resource Server MUST respond with the HTTP <code>401</code> status code,
392-
and a <code>WWW-Authenticate</code> HTTP header. See also: [[RFC9110##name-www-authenticate]]
392+
and a <code>WWW-Authenticate</code> HTTP header. See also: [[RFC9110]](11.6.1. WWW-Authenticate)
393393

394394
The <code>WWW-Authenticate</code> HTTP header MUST include an <code>as_uri</code>
395395
parameter unless the authentication scheme requires a different mechanism
@@ -455,7 +455,7 @@ Considerations in context of the Solid Protocol [[!SOLID-PROTOCOL]].
455455

456456
## TLS Requirements ## {#security-tls}
457457

458-
All TLS requirements outlined in [[BCP195](https://tools.ietf.org/html/bcp195)] apply to this
458+
All TLS requirements outlined in [[BCP195]] apply to this
459459
specification.
460460

461461
All tokens, Client, and User credentials MUST only be transmitted over TLS.
@@ -665,6 +665,11 @@ The JSON-LD context is defined as:
665665
"href": "https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html",
666666
"title": "User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization",
667667
"publisher": "Kantara Initiative, Inc"
668+
},
669+
"BCP195": {
670+
"href": "https://www.rfc-editor.org/info/bcp195",
671+
"title": "Best Current Practice 195",
672+
"publisher": "IETF"
668673
}
669674
}
670675
</pre>

0 commit comments

Comments
 (0)