Skip to content

Commit

Permalink
update changelog
Browse files Browse the repository at this point in the history
  • Loading branch information
aaronpk committed Mar 13, 2023
1 parent efb21bf commit d384ca0
Showing 1 changed file with 4 additions and 3 deletions.
7 changes: 4 additions & 3 deletions draft-ietf-oauth-v2-1.md
Original file line number Diff line number Diff line change
Expand Up @@ -3042,8 +3042,8 @@ needing to authenticate from scratch in each app. See {{native-apps-embedded-us
for a deeper analysis of the drawbacks of using embedded user agents
for OAuth.

Native app authorization requests that use the browser are more
secure and can take advantage of the user's authentication state.
Native app authorization requests that use the system browser are more
secure and can take advantage of the user's authentication state on the device.
Being able to use the existing authentication session in the browser
enables single sign-on, as users don't need to authenticate to the
authorization server each time they use a new app (unless required by
Expand Down Expand Up @@ -3635,7 +3635,7 @@ Discussions around this specification have also occurred at the OAuth Security W

[[ To be removed from the final specification ]]

-latest
-08

* Updated acknowledgments
* Swap "by a trusted party" with "by an outside party" in client ID definition
Expand All @@ -3648,6 +3648,7 @@ Discussions around this specification have also occurred at the OAuth Security W
* Moved "scope" parameter in token request into specific grant types to match OAuth 2.0
* Updated Clickjacking and Open Redirection description from the latest version of the Security BCP
* Moved normative requirements out of authorization code security considerations section
* Security considerations clarifications, and removed a duplicate section

-07

Expand Down

0 comments on commit d384ca0

Please sign in to comment.