@@ -6802,7 +6802,7 @@ components:
68026802 The Bearer token is an access token in [JWT](https://datatracker.ietf.org/doc/html/rfc7519) format
68036803 as defined in RFC 7519. For openEO, it MUST include the issuer in the
68046804 `iss` claim although being optional in RFC 7519.
6805- If the concept of an issuer doesn not exist in an authentication method (e.g. in HTTP Basic),
6805+ If the concept of an issuer does not exist in an authentication method (e.g. in HTTP Basic),
68066806 implementations could use the endpoint for Basic Authentication as the issuer, for example.
68076807
68086808 openEO backend implementations MUST signal their support for JWT by listing the given
@@ -6824,12 +6824,12 @@ components:
68246824 For OpenID Connect, the provider ID corresponds to the value
68256825 specified for `id` for each provider in `GET /credentials/oidc`.
68266826
6827- All servers must accept this method for backward compatibility
6827+ All openEO backends MUST accept this method for backward compatibility
68286828 until version 2.0 of the specification.
68296829
68306830 The access tokens provided by the identity provider do not include
68316831 the prefix that includes the authentication method and provider ID.
6832- The Bearer Token sent to the server MUST have the prefix, e.g. `basic//` for Basic authentication.
6832+ The Bearer Token sent to the openEO backend MUST have the prefix, e.g. `basic//` for Basic authentication.
68336833 This means that the clients have to prepend the prefix.
68346834
68356835 JWT and openEO tokens can be distinguished by the presence of a slash
0 commit comments