@@ -389,7 +389,7 @@ the verifying party MUST follow OpenID Connect Discovery 1.0 [[!OIDC-DISCOVERY]]
389389
390390When a Client performs an unauthenticated request to a protected resource,
391391the Resource Server MUST respond with the HTTP <code> 401</code> status code,
392- and a <code> WWW-Authenticate</code> HTTP header. See also: [[RFC9110##name-www-authenticate]]
392+ and a <code> WWW-Authenticate</code> HTTP header. See also: [[RFC9110]] (11.6.1. WWW-Authenticate)
393393
394394The <code> WWW-Authenticate</code> HTTP header MUST include an <code> as_uri</code>
395395parameter unless the authentication scheme requires a different mechanism
@@ -455,7 +455,7 @@ Considerations in context of the Solid Protocol [[!SOLID-PROTOCOL]].
455455
456456## TLS Requirements ## {#security-tls}
457457
458- All TLS requirements outlined in [[BCP195] (https://tools.ietf.org/html/bcp195) ] apply to this
458+ All TLS requirements outlined in [[BCP195]] apply to this
459459specification.
460460
461461All tokens, Client, and User credentials MUST only be transmitted over TLS.
@@ -665,6 +665,11 @@ The JSON-LD context is defined as:
665665 "href": "https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html",
666666 "title": "User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization",
667667 "publisher": "Kantara Initiative, Inc"
668+ },
669+ "BCP195": {
670+ "href": "https://www.rfc-editor.org/info/bcp195",
671+ "title": "Best Current Practice 195",
672+ "publisher": "IETF"
668673 }
669674}
670675</pre>
0 commit comments