Closed charsleysa closed 2 days ago
https://example.com/verifier
is a valid client identifier, using the Client Identifier Scheme https
which is currently defined to mean an OpenID Federation entity id - see the text here:
So yes the client id scheme must be included in the aud
claim value. It might make sense to use x509_san_uri in the example instead to make it clearer.
It might also make sense to change things such that all client id schemes are treated equally with respect to prefixing. And maybe avoid potential confusion like this.
I agree with @jogu. The example is valid as is.
@jogu thanks for the clarification.
It would also be clearer if the client_id in the example requests matched the values in the example responses.
I see that request examples in B.4.4 and B.5.1 have different values to the response values in B.4.5 and B.5.1 respectively.
fair point on B.4.4 and B.4.5 not matching - did PR #332. B.5.1 and B.5.2 already match I think
The example in B.4.5 shows that the
aud
claim should have a value ofhttps://example.com/verifier
, however the note says that it should be the same value as the Client Identifier (which would contain the Client Identifier Scheme).Other examples (such as B.5.2) have the scheme included.
Is this a typo or is the intention to strip the scheme for Key Binding JWTs?