Skip to content

Commit d384ca0

Browse files
committed
update changelog
1 parent efb21bf commit d384ca0

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

draft-ietf-oauth-v2-1.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3042,8 +3042,8 @@ needing to authenticate from scratch in each app. See {{native-apps-embedded-us
30423042
for a deeper analysis of the drawbacks of using embedded user agents
30433043
for OAuth.
30443044

3045-
Native app authorization requests that use the browser are more
3046-
secure and can take advantage of the user's authentication state.
3045+
Native app authorization requests that use the system browser are more
3046+
secure and can take advantage of the user's authentication state on the device.
30473047
Being able to use the existing authentication session in the browser
30483048
enables single sign-on, as users don't need to authenticate to the
30493049
authorization server each time they use a new app (unless required by
@@ -3635,7 +3635,7 @@ Discussions around this specification have also occurred at the OAuth Security W
36353635

36363636
[[ To be removed from the final specification ]]
36373637

3638-
-latest
3638+
-08
36393639

36403640
* Updated acknowledgments
36413641
* Swap "by a trusted party" with "by an outside party" in client ID definition
@@ -3648,6 +3648,7 @@ Discussions around this specification have also occurred at the OAuth Security W
36483648
* Moved "scope" parameter in token request into specific grant types to match OAuth 2.0
36493649
* Updated Clickjacking and Open Redirection description from the latest version of the Security BCP
36503650
* Moved normative requirements out of authorization code security considerations section
3651+
* Security considerations clarifications, and removed a duplicate section
36513652

36523653
-07
36533654

0 commit comments

Comments
 (0)