Skip to content

Releases: oauth-wg/oauth-v2-1

draft-ietf-oauth-v2-1-14

20 Oct 01:38
e98dfa5

Choose a tag to compare

What's Changed

  • reference 7523 updates by @panva in #217
  • Fix an error in a RFC9700 reference by @NilsRenaud in #218
  • ref Section 4.3.4 of RFC9110 for TLS server cert check by @bc-pi in #222
  • editorial nits by @aaronpk in #224
  • add references to client authentication method names from RFC7591 by @aaronpk in #223
  • s/relying party/resource server by @aaronpk in #225
  • replace "sanitize" language by @aaronpk in #226
  • scope native apps language to mobile apps by @aaronpk in #227
  • Clarify that there is no requirement that an AS supports public or co… by @aaronpk in #228

New Contributors

Full Changelog: draft-ietf-oauth-v2-1-13...draft-ietf-oauth-v2-1-14

draft-ietf-oauth-v2-1-13

28 May 13:56

Choose a tag to compare

  • Sorted list of extensions by RFC number
  • Updated references to OAuth Security BCP -> RFC9700
  • Deep link to RFC section numbers

draft-ietf-oauth-v2-1-12

15 Nov 17:15

Choose a tag to compare

Changes

  • Added DPoP and Step-Up Auth to appendix of extensions
  • Updated reference for case insensitivity of auth scheme to HTTP instead of ABNF (#186)
  • Corrected an instance of "relying party" vs "client" (#169)
  • Moved client_id requirement to the individual grant types
  • Updated language around client registration to better reflect alternative registration methods such as those in use by OpenID Federation and open ecosystems
  • fixed typos #185
  • consolidated description of serialization #181 #190

draft-ietf-oauth-v2-1-11

15 May 00:11

Choose a tag to compare

Changes discussed at May 14 Interim

  • resolves client credentials encoding issue #128
  • Recommend against defining custom scopes that conflict with known scopes #163
  • Explicitly mention that Bearer is case insensitive #166

Editorial Changes

New Contributors

Full Changelog: draft-ietf-oauth-v2-1-10...draft-ietf-oauth-v2-1-11

Draft 10

09 Jan 23:46

Choose a tag to compare

  • Clarify that the client id is an opaque string
  • Extensions may define additional error codes on a resource request
  • Improved formatting for error field definitions
  • Moved and expanded "scope" definition to introduction section
  • Split access token section into structure and request
  • Renamed b64token to token68 for consistency with RFC7235
  • Restored content from old appendix B about application/x-www-form-urlencoded
  • Clarified that clients must not parse access tokens
  • Expanded text around when redirect_uri parameter is required in the authorization request
  • Changed "permissions" to "privileges" in refresh token section for consistency
  • Consolidated authorization code flow security considerations
  • Clarified authorization code reuse - an authorization code can only obtain an access token once

Draft 09

09 Jan 23:44

Choose a tag to compare

  • AS MUST NOT support CORS requests at authorization endpoint
  • more detail on asymmetric client authentication
  • sync CSRF description from security BCP
  • update and move sender-constrained access tokens section
  • sync client impersonating resource owner with security BCP
  • add reference to authorization request from redirect URI registration section
  • sync refresh rotation section from security BCP
  • sync redirect URI matching text from security BCP
  • updated references to RAR (RFC9396)
  • clarifications on URIs
  • removed redirect_uri from the token request
  • expanded security considerations around code_verifier
  • revised introduction section

Draft 08

13 Mar 22:41

Choose a tag to compare

  • Swap "by a trusted party" with "by an outside party" in client ID definition
  • Replaced "verify the identity of the resource owner" with "authenticate"
  • Clarified refresh token rotation to match RFC6819
  • Added appendix to hold application/x-www-form-urlencoded examples
  • Fixed references to entries in appendix
  • Incorporated new "Phishing via AS" section from Security BCP
  • Rephrase description of the motivation for client authentication
  • Moved "scope" parameter in token request into specific grant types to match OAuth 2.0
  • Updated Clickjacking and Open Redirection description from the latest version of the Security BCP
  • Moved normative requirements out of authorization code security considerations section
  • Security considerations clarifications, and removed a duplicate section
  • Updated acknowledgments

Draft 07

24 Oct 22:38

Choose a tag to compare

  • Removed "third party" from abstract
  • Added MFA and passwordless as additional motiviations in introduction
  • Mention PAR as one way redirect URI registration can happen
  • Added a reference to requiring CORS headers on the token endpoint
  • Updated reference to OMAP extension
  • Fixed numbering in sequence diagram