[OAUTH-WG] [Errata Verified] RFC7662 (4764)
RFC Errata System <rfc-editor@rfc-editor.org> Wed, 17 January 2024 14:22 UTC
Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3498CC151997; Wed, 17 Jan 2024 06:22:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.658
X-Spam-Level:
X-Spam-Status: No, score=-1.658 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 85Z6ZWfA7ISf; Wed, 17 Jan 2024 06:22:46 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64C47C151993; Wed, 17 Jan 2024 06:22:46 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 51555EDFA8; Wed, 17 Jan 2024 06:22:46 -0800 (PST)
To: bcampbell@pingidentity.com, ietf@justin.richer.org
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: rdd@cert.org, iesg@ietf.org, oauth@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240117142246.51555EDFA8@rfcpa.amsl.com>
Date: Wed, 17 Jan 2024 06:22:46 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/s2O6XItVryg0kef8u4qEfCdWf7o>
Subject: [OAUTH-WG] [Errata Verified] RFC7662 (4764)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jan 2024 14:22:50 -0000
The following errata report has been verified for RFC7662, "OAuth 2.0 Token Introspection". -------------------------------------- You may review the report below and at: https://www.rfc-editor.org/errata/eid4764 -------------------------------------- Status: Verified Type: Editorial Reported by: Brian Campbell <bcampbell@pingidentity.com> Date Reported: 2016-08-04 Verified by: Roman Danyliw (IESG) Section: 3.1 Original Text ------------- OAuth registration client metadata names and descriptions are registered by Corrected Text -------------- OAuth token introspection response parameters are registered by Notes ----- The original text erroneously mentions registration of client metadata names, however, this RFC 7662 is about about token introspection and this section is about registration of token introspection response parameters (client metadata name registration is RFC 7591). -------------------------------------- RFC7662 (draft-ietf-oauth-introspection-11) -------------------------------------- Title : OAuth 2.0 Token Introspection Publication Date : October 2015 Author(s) : J. Richer, Ed. Category : PROPOSED STANDARD Source : Web Authorization Protocol Area : Security Stream : IETF Verifying Party : IESG
- [OAUTH-WG] [Errata Verified] RFC7662 (4764) RFC Errata System