Skip to content
This repository was archived by the owner on Apr 13, 2022. It is now read-only.

Commit f5380aa

Browse files
jaxoncreeddmitrizagidulin
authored andcommitted
Fix dmitri and michiel issues
1 parent 934f877 commit f5380aa

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,8 @@ WebID-OIDC makes the following changes to the base OpenID Connect protocol
9999
* Specifies the [Authorized OIDC Issuer
100100
Discovery](#authorized-oidc-issuer-discovery) process (used as part of
101101
Provider Confirmation, and during Provider Selection steps).
102-
* Utilizes [PoP tokens](https://tools.ietf.org/html/rfc7800) to securely
103-
query a wide array of resource providers.
102+
* Utilizes [PoP tokens](https://tools.ietf.org/html/rfc7800) as a means to
103+
access a wide array of resource providers.
104104

105105
It's also worth mentioning that while traditional OpenID Connect use cases are
106106
concerned with retrieving user-related claims from [UserInfo
@@ -318,9 +318,9 @@ However, given Solid's use case, a token should be usable for any RP so the user
318318

319319
The solution employs [Proof of Possession (PoP) tokens](https://tools.ietf.org/html/rfc7800) changing the way the Bearer token is constructed:
320320

321-
1. A client application generates a public and private key.
321+
1. A client application generates a short-lived public and private key.
322322
2. The client generates a request `JWT` just as it would under normal OIDC with the addition of a `key` field containing the public key.
323-
3. Authentication proceeds normally and yeilds a signed `id_token` where the `aud`ience is the client application (represented by the `origin` of the provided `redirect_uri`) and an additional field `cnf` is provided containing the client's public key.
323+
3. Authentication proceeds normally and yields a signed `id_token` where the `aud`ience is the client application (represented by the `origin` of the provided `redirect_uri`) and an additional field `cnf` is provided containing the client's public key.
324324
4. Before sending requests to any RPs, the client generates a new signed JWT PoP token containing the RP's uri as the `aud`ience and an `id_token` feild containing the `id_token` provided by the OP.
325325
5. When an RP receives the PoP token, it MUST reject any tokens containing a mismatched audience or a signature that is not associated with the public key in the `cnf` claim.
326326

0 commit comments

Comments
 (0)