Section 2.1
Delete (there is not enough context at this point for the reader to understand why the examples are being described here): In one example, the resource server acts as the client and in the other, the authorization server acts as the client.
Section 2.4.2
From: If the assertion contains a requested_cnf claim and any other way of proof of possession has been supplied by the caller the correspond information MUST be equal.
To: If the assertion contains a requested_cnf claim and any other way of proof of possession has been supplied by the caller the corresponding information MUST be equal.
Section 2.1 Delete (there is not enough context at this point for the reader to understand why the examples are being described here): In one example, the resource server acts as the client and in the other, the authorization server acts as the client.
Section 2.4.2 From: If the assertion contains a requested_cnf claim and any other way of proof of possession has been supplied by the caller the correspond information MUST be equal.
To: If the assertion contains a requested_cnf claim and any other way of proof of possession has been supplied by the caller the corresponding information MUST be equal.