[OAUTH-WG] [Errata Verified] RFC7662 (4764)

RFC Errata System <rfc-editor@rfc-editor.org> Wed, 17 January 2024 14:22 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3498CC151997; Wed, 17 Jan 2024 06:22:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.658
X-Spam-Level:
X-Spam-Status: No, score=-1.658 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 85Z6ZWfA7ISf; Wed, 17 Jan 2024 06:22:46 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64C47C151993; Wed, 17 Jan 2024 06:22:46 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 51555EDFA8; Wed, 17 Jan 2024 06:22:46 -0800 (PST)
To: bcampbell@pingidentity.com, ietf@justin.richer.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: rdd@cert.org, iesg@ietf.org, oauth@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240117142246.51555EDFA8@rfcpa.amsl.com>
Date: Wed, 17 Jan 2024 06:22:46 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/s2O6XItVryg0kef8u4qEfCdWf7o>
Subject: [OAUTH-WG] [Errata Verified] RFC7662 (4764)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jan 2024 14:22:50 -0000

The following errata report has been verified for RFC7662,
"OAuth 2.0 Token Introspection". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid4764

--------------------------------------
Status: Verified
Type: Editorial

Reported by: Brian Campbell <bcampbell@pingidentity.com>
Date Reported: 2016-08-04
Verified by: Roman Danyliw (IESG)

Section: 3.1

Original Text
-------------
OAuth registration client metadata names and descriptions are
registered by

Corrected Text
--------------
OAuth token introspection response parameters are registered by

Notes
-----
The original text erroneously mentions registration of client metadata names, however, this RFC 7662 is about about token introspection and this section is about registration of token introspection response parameters (client metadata name registration is RFC 7591).

--------------------------------------
RFC7662 (draft-ietf-oauth-introspection-11)
--------------------------------------
Title               : OAuth 2.0 Token Introspection
Publication Date    : October 2015
Author(s)           : J. Richer, Ed.
Category            : PROPOSED STANDARD
Source              : Web Authorization Protocol
Area                : Security
Stream              : IETF
Verifying Party     : IESG