Skip to content

Commit 019fa43

Browse files
committed
docs: update spec links
1 parent 3273aef commit 019fa43

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ _Note that not all features are enabled by default, check the configuration sect
3939
- [`RFC9701` - JWT Response for OAuth Token Introspection][jwt-introspection]
4040
- [FAPI 1.0 Security Profile - Part 2: Advanced (`FAPI 1.0`)][fapi]
4141
- [FAPI 2.0 Security Profile (`FAPI 2.0`)][fapi2sp]
42+
- [FAPI 2.0 Message Signing (`FAPI 2.0`)][fapi2ms]
4243
- [JWT Secured Authorization Response Mode for OAuth 2.0 (`JARM`)][jarm]
4344
- [OIDC Client Initiated Backchannel Authentication Flow (`CIBA`)][ciba]
4445

@@ -50,7 +51,6 @@ Supported Access Token formats:
5051
The following draft specifications are implemented by oidc-provider:
5152

5253
- [Financial-grade API: Client Initiated Backchannel Authentication Profile (`FAPI-CIBA`) - Implementers Draft 01][fapi-ciba]
53-
- [FAPI 2.0 Message Signing (`FAPI 2.0`) - Implementers Draft 01][fapi2ms-id1]
5454
- [OIDC Relying Party Metadata Choices 1.0 - Implementers Draft 01][rp-metadata-choices]
5555
- [OAuth 2.0 Attestation-Based Client Authentication - Draft 06][attestation-client-auth]
5656

@@ -155,7 +155,7 @@ actions and i.e. emit metrics that react to specific triggers. See the list of a
155155
[mtls]: https://www.rfc-editor.org/rfc/rfc8705.html
156156
[dpop]: https://www.rfc-editor.org/rfc/rfc9449.html
157157
[resource-indicators]: https://www.rfc-editor.org/rfc/rfc8707.html
158-
[jarm]: https://openid.net/specs/oauth-v2-jarm-final.html
158+
[jarm]: https://openid.net/specs/oauth-v2-jarm-errata1.html
159159
[jwt-at]: https://www.rfc-editor.org/rfc/rfc9068.html
160160
[support-sponsor]: https://github.com/sponsors/panva
161161
[par]: https://www.rfc-editor.org/rfc/rfc9126.html
@@ -165,7 +165,7 @@ actions and i.e. emit metrics that react to specific triggers. See the list of a
165165
[ciba]: https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0-final.html
166166
[fapi-ciba]: https://openid.net/specs/openid-financial-api-ciba-ID1.html
167167
[fapi2sp]: https://openid.net/specs/fapi-security-profile-2_0-final.html
168-
[fapi2ms-id1]: https://openid.net/specs/fapi-2_0-message-signing-ID1.html
168+
[fapi2ms]: https://openid.net/specs/fapi-message-signing-2_0-final.html
169169
[Security Policy]: https://github.com/panva/node-oidc-provider/security/policy
170170
[rp-metadata-choices]: https://openid.net/specs/openid-connect-rp-metadata-choices-1_0-ID1.html
171171
[rfc8414]: https://www.rfc-editor.org/rfc/rfc8414.html

docs/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1383,7 +1383,7 @@ _**default value**_:
13831383
13841384
### features.jwtResponseModes
13851385
1386-
[JWT Secured Authorization Response Mode (`JARM`)](https://openid.net/specs/oauth-v2-jarm-final.html)
1386+
[JWT Secured Authorization Response Mode (`JARM`)](https://openid.net/specs/oauth-v2-jarm-errata1.html)
13871387
13881388
Specifies whether JWT Secured Authorization Response Mode capabilities shall be enabled. When enabled, the authorization server shall support encoding authorization responses as JSON Web Tokens, providing cryptographic protection and integrity assurance for authorization response parameters.
13891389

lib/helpers/defaults.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1609,7 +1609,7 @@ function makeDefaults() {
16091609
/*
16101610
* features.jwtResponseModes
16111611
*
1612-
* title: [JWT Secured Authorization Response Mode (`JARM`)](https://openid.net/specs/oauth-v2-jarm-final.html)
1612+
* title: [JWT Secured Authorization Response Mode (`JARM`)](https://openid.net/specs/oauth-v2-jarm-errata1.html)
16131613
*
16141614
* description: Specifies whether JWT Secured Authorization Response Mode capabilities shall
16151615
* be enabled. When enabled, the authorization server shall support encoding authorization

0 commit comments

Comments
 (0)