> -----Original Message-----
> From: Pawel Kowalik <kowa...@denic.de>
> Sent: Thursday, February 2, 2023 1:59 AM
> To: Hollenbeck, Scott <shollenb...@verisign.com>; regext@ietf.org
> Subject: [EXTERNAL] Re: [regext] I-D Action: draft-ietf-regext-rdap-openid-
> 21.txt
>
> Caution: This email originated from outside the organization. Do not click 
> links
> or open attachments unless you recognize the sender and know the content is
> safe.
>
> Hi Scott,
>
> It looks good, I have few minor points:
>
> 1. The new paragraph in Section 3 uses a term "bearer token". I suggest to use
> "Access Token" as a defined term (same in 6.2).
>
> Also the "session" in this case can go beyond the lifespan of the Access 
> Token if
> token refresh is possible.

[SAH] Yes, the concept of the session is directly related to the existence and 
validity of an Access Token, which may be refreshed. How would you suggest that 
this be reworded?

> 2. In 3.1.2 maybe it is worth to state the obvious, that the server not 
> supporting
> one or the other kind of client would not support Protocol Features - the data
> structures, path segments, parameters and interactions - for this kind of 
> client.
> Common Protocol Features would be supported by both kind of clients.
>
> I would also include a reference to the signaling of supported client types in
> 4.1.

[SAH] OK.

> 3. The note about "Implicit Flow" - wouldn't "Security Considerations"
> be a better place for this remark?

[SAH] I like noting it where it's first mentioned, but yes, it could be 
mentioned in the "Security Considerations" section, too.

Scott
_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to