Closed jonathan-r-thorpe closed 3 years ago
The description of this claim was included in the Implementation Guide as it is used by some Authentication Servers (for example Keycloak). However, this is probably better placed in the specification itself.
The description of this claim was included in the Implementation Guide as it is used by some Authentication Servers (for example Keycloak). However, this is probably better placed in the specification itself.