Skip to content

Commit efb21bf

Browse files
committed
fix references
1 parent e0059eb commit efb21bf

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

draft-ietf-oauth-v2-1.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -796,12 +796,12 @@ rely on the CSRF protection provided by that mechanism. In OpenID Connect flows,
796796
validating the `nonce` parameter provides CSRF protection. Otherwise, one-time
797797
use CSRF tokens carried in the `state` parameter that are securely
798798
bound to the user agent MUST be used for CSRF protection (see
799-
(#csrf_countermeasures)).
799+
{{csrf_countermeasures}}).
800800

801801

802802
### Preventing Mix-Up Attacks
803803

804-
In order to prevent mix-up attacks (see (#mix_up)), clients MUST only process redirect
804+
In order to prevent mix-up attacks, clients MUST only process redirect
805805
responses of the authorization server they sent the respective request
806806
to and from the same user agent this authorization request was
807807
initiated with. Clients MUST store the authorization server they sent
@@ -943,7 +943,7 @@ mapping between the client identifier (registration record) and
943943
authentication scheme.
944944

945945
Some additional authentication methods such as mTLS {{RFC8705}}
946-
and "private_key_jwt" {{OpenID}} are defined in the
946+
and Private Key JWT {{RFC7523}} are defined in the
947947
"[OAuth Token Endpoint Authentication Methods](https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#token-endpoint-auth-method)" registry,
948948
and may be useful as generic client authentication methods beyond
949949
the specific use of protecting the token endpoint.

0 commit comments

Comments
 (0)