Events without label "editorial"

Issues
------
* oauth-wg/oauth-transaction-tokens (+0/-3/💬4)
 4 issues received 4 new comments:
 - #223 Clarify Example (1 by PieterKas)
https://github.com/oauth-wg/oauth-transaction-tokens/issues/223 [WGLC Feedback] - #222 Should tctx field be a MUST (1 by PieterKas) https://github.com/oauth-wg/oauth-transaction-tokens/issues/222 [WGLC Feedback] - #221 Clarify difference between sub and req_wl (1 by PieterKas) https://github.com/oauth-wg/oauth-transaction-tokens/issues/221 [WGLC Feedback] - #220 Clarify aud claim (1 by PieterKas) https://github.com/oauth-wg/oauth-transaction-tokens/issues/220 [WGLC Feedback]
 3 issues closed:
- Expand on use case in section 2.2.1 https://github.com/oauth-wg/oauth-transaction-tokens/issues/208 [WGLC Feedback] - WGLC feedback from Brian - Editorial https://github.com/oauth-wg/oauth-transaction-tokens/issues/204 [WGLC Feedback] - 18 287 4576 https://github.com/oauth-wg/oauth-transaction-tokens/issues/263
* oauth-wg/oauth-sd-jwt-vc (+0/-18/💬20)
 13 issues received 20 new comments:
 - #346 Support of the default Issuer Signature Mechanism. Required or not? (1 
by danielfett)
https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/346 [discuss] [pending close] - #293 Risk of issuer monitoring with jwt-vc-issuer metadata (3 by awoie, cre8) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/293 - #291 Support of the suspension or of the revovation of a Digital Credential without using the status claim (1 by danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/291 [pending close] [policy] - #289 The SD-JWT DC does not CONTAIN the Key Binding JWT (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/289 [HAS PR] - #288 The definition of "Verifiable Credential (VC)"should be replaced by a definition of "Digital Credential (DC)" (2 by awoie, danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/288 [pending close] - #287 The following sentence would need to be clarified and reworded (1 by danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/287 [pending close] - #286 Suspension and revocation of Digital Credentials (1 by danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/286 [pending close] [future-extension] [policy] - #284 A statement about "Verifiable Credentials" should be changed (2 by bc-pi, danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/284 [pending close] - #283 The wording "Verifiable Credentials" should be changed into "Digital Credentials" (2 by awoie, danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/283 [pending close] - #273 Provide guidance on versioning (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/273 [HAS PR] - #247 Potential Privacy implications of verifier knowing display information (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/247 [pending close] [blocked] - #222 allow JWS JSON serialization (was add example) (3 by awoie, bc-pi, danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/222 [pending close] - #145 how cnf claim can be used with any other types of "binding" (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/145 [pending close] [future-extension]
 18 issues closed:
- allow JWS JSON serialization (was add example) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/222 [pending close] - Potential Privacy implications of verifier knowing display information https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/247 [pending close] [blocked] - Suspension and revocation of Digital Credentials https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/286 [pending close] [future-extension] [policy] - Support of the default Issuer Signature Mechanism. Required or not? https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/346 [discuss] [pending close] - A statement about "Verifiable Credentials" should be changed https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/284 [pending close] - The following sentence would need to be clarified and reworded https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/287 [pending close] - The definition of "Verifiable Credential (VC)"should be replaced by a definition of "Digital Credential (DC)" https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/288 [pending close] - The wording "Verifiable Credentials" should be changed into "Digital Credentials" https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/283 [pending close] - Support of the suspension or of the revovation of a Digital Credential without using the status claim https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/291 [pending close] [policy] - Provide guidance on versioning https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/273 [HAS PR] - Figure 1 Issuer-Holder-Verifier Model should be modified https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/285 [HAS PR] - The SD-JWT DC does not CONTAIN the Key Binding JWT https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/289 [HAS PR] - Add security considerations on when/what metadata is/can be trusted https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/282 [HAS PR] - Consider recommending a way to encode other data types. https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/225 [HAS PR] - Declaration of arrays to the type metadata. https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/314 [HAS PR] - Add language on x5c protection https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/240 [HAS PR] - Risk of issuer monitoring with jwt-vc-issuer metadata https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/293 - Say something about presentations if KB-JWT is not used https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/297 [HAS PR]
* oauth-wg/draft-ietf-oauth-resource-metadata (+0/-1/💬1)
 1 issues received 1 new comments:
 - #56 Ambiguous handling of the resource_metadata WWW-Authenticate parameter 
(1 by aaronpk)
https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata/issues/56
 1 issues closed:
- Ambiguous handling of the resource_metadata WWW-Authenticate parameter https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata/issues/56
* oauth-wg/oauth-v2-1 (+0/-4/💬4)
 3 issues received 4 new comments:
 - #210 Add definitions for client_secret_basic, client_secret_post and none 
client authentication methods (1 by aaronpk)
https://github.com/oauth-wg/oauth-v2-1/issues/210 [ietf-124] - #183 Clarify `aud` values that should be accepted in `private_key_jwt` at the token (and other) endpoints (2 by aaronpk, bc-pi) https://github.com/oauth-wg/oauth-v2-1/issues/183 - #120 How can an AS support both 2.0 and 2.1 clients concurrently (1 by njwatson32) https://github.com/oauth-wg/oauth-v2-1/issues/120 [ietf-124]
 4 issues closed:
- what does it mean to "sanitise" state/redirect urls? https://github.com/oauth-wg/oauth-v2-1/issues/209 - Add definitions for client_secret_basic, client_secret_post and none client authentication methods https://github.com/oauth-wg/oauth-v2-1/issues/210 [ietf-124] - Strict JavaScript Exclusiveness? https://github.com/oauth-wg/oauth-v2-1/issues/174 - specific reference to Section 4.3.4 of RFC9100 for TLS server certificate check https://github.com/oauth-wg/oauth-v2-1/issues/221
* oauth-wg/draft-ietf-oauth-status-list (+0/-0/💬2)
 1 issues received 2 new comments:
 - #304 Feedback from AD review (2 by c2bo, paulbastian)
https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/304
* oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+13/-0/💬0)
 13 issues created:
 - Editorial: Remove two sentences that contain left references to nonce (by 
Denisthemalice)
https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/165 - In section 10.6. (Replay Attack Detection) the current description is incorrect (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/164 - A client should be able to request a challenge without using a challenge endpoint (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/163 - It is proposed to remove use self-contained challenges (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/162 - The terminology in section 3 should be changed (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/161 - The Figure 1 should be redrawn (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/160 - The Client Attestation PoP JWT should be able to support a data origin authentication service (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/159 - The description of the flows should be reconsidered (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/158 - The Introduction should be reworded (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/157 - It would be worthwhile to define claims able to carry the type of the device and the firmware/software that the device is running (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/156 - The privacy considerations in section 11 from RFC 9334 should be endorsed (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/155 - A protocol for the renewal of one-time use Client Attestation JWTs is necessary (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/154 - Should this document be applicable both to Authorization Servers and Resource Servers ? (by Denisthemalice) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/153
* oauth-wg/oauth-identity-assertion-authz-grant (+1/-5/💬30)
 1 issues created:
 - recommendation on https for audience param? (by sdesen)
https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/53
 12 issues received 30 new comments:
 - #53 recommendation on https for audience param? (1 by mcguinness)
https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/53 - #52 Discovering allowed Resource App (instances) for the logged in user (3 by mcguinness, meghnadubey) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/52 - #51 Support for Multi-Instance Apps (12 by aaronpk, dlozlla, mcguinness, meghnadubey) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/51 - #48 The spec states that `refresh_token` SHOULD NOT be used (1 by mcguinness) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/48 - #45 Clarify that IdP client can be mapped via ID-JAG to AS specific client (2 by aaronpk, meghnadubey) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/45 - #41 Clarify ID-JAG is a typed profile of JWT Assertion Grant (1 by aaronpk) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/41 - #40 Editorial cleanup to make clear interaction and role of the AS for the Resource App (1 by aaronpk) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/40 - #39 Adopt Tenant Claim from OpenID Enterprise Extensions for ID-JAG (1 by aaronpk) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/39 - #28 Proof-of-Possession Token for Resource App (5 by aaronpk, mcguinness) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/28 - #17 Client ID Registration (1 by aaronpk) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/17 - #14 Discuss the need for client_id mapping (1 by aaronpk) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/14 - #13 Why don't the IdP requests the access token from the AS? (1 by aaronpk) https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/13
 5 issues closed:
- Editorial cleanup to make clear interaction and role of the AS for the Resource App https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/40 - Add scope to 6.1 processing rules https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/49 - Adopt Tenant Claim from OpenID Enterprise Extensions for ID-JAG https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/39 - Clarify ID-JAG is a typed profile of JWT Assertion Grant https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/41 - id-jag SHOULD be short-lived https://github.com/oauth-wg/oauth-identity-assertion-authz-grant/issues/37
* oauth-wg/draft-ietf-oauth-client-id-metadata-document (+0/-0/💬5)
 1 issues received 5 new comments:
 - #36 specify native app restriction for clarity on client authentication 
section (5 by JetA2, ThisIsMissEm, aaronpk, matthieusieben)
https://github.com/oauth-wg/draft-ietf-oauth-client-id-metadata-document/issues/36


Pull requests
-------------
* oauth-wg/oauth-identity-chaining (+1/-0/💬0)
 1 pull requests submitted:
 -  (by arndt-s)
* oauth-wg/oauth-transaction-tokens (+2/-0/💬0)
 2 pull requests submitted:
 -  (by PieterKas)
- (by arndt-s)
* oauth-wg/oauth-sd-jwt-vc (+12/-0/💬12)
 12 pull requests submitted:
 -  (by bc-pi)
- (by danielfett) - (by danielfett) - (by danielfett) - (by awoie) - (by awoie) - (by bc-pi) - (by awoie) - (by awoie) - (by awoie) - (by bc-pi) - (by bc-pi)
 6 pull requests received 12 new comments:
 - #371 Change PID example to make clear that it is not normative in any way (1 
by bc-pi)
https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/371 - #368 Improve example around array elements and paths (1 by danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/368 - #364 editorial: fix formatting (2 by awoie, danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/364 - #363 Limit scope of x509 certificates to protected header (6 by awoie, bc-pi, danielfett, peppelinux) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/363 [discuss] [DO NOT MERGE] - #362 make it clear that presentations don't need kb (1 by awoie) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/362 - #360 Provide some guidance on versioning via the `vct` value (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/360
* oauth-wg/oauth-v2-1 (+4/-0/💬0)
 4 pull requests submitted:
 -  (by aaronpk)
- (by aaronpk) - (by aaronpk) - (by aaronpk)
* oauth-wg/draft-ietf-oauth-status-list (+1/-0/💬1)
 1 pull requests submitted:
 -  (by paulbastian)
 1 pull requests received 1 new comments:
 - #305 AD review (1 by c2bo)
https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/305
* oauth-wg/oauth-identity-assertion-authz-grant (+3/-0/💬0)
 3 pull requests submitted:
 -  (by aaronpk)
- (by mcguinness) - (by mcguinness)

Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1
* https://github.com/oauth-wg/draft-ietf-oauth-status-list
* https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth
* https://github.com/oauth-wg/oauth-identity-assertion-authz-grant
* https://github.com/oauth-wg/draft-ietf-oauth-rfc8725bis
* https://github.com/oauth-wg/draft-ietf-oauth-rfc7523bis
* https://github.com/oauth-wg/oauth-first-party-apps
* https://github.com/oauth-wg/draft-ietf-oauth-client-id-metadata-document


--
To have a summary like this sent to your list, see: 
https://github.com/ietf-github-services/activity-summary
_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to