Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the XML file.

1) <!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on https://www.rfc-editor.org/search. -->


2) <!--[rfced] We changed this paragraph into smaller sentences
for easier reading and arranged the list of items in alphabetical
order. Please let us know of any objections.

Original:
   Terminology specific to GNAP is defined in the terminology section of
   the core specification [GNAP], and provides definitions for the
   protocol roles: authorization server (AS), client, resource server
   (RS), resource owner (RO), end user; as well as the protocol elements:
   attribute, access token, grant, privilege, protected resource, right,
   subject, subject information. The same definitions are used in this
   document.

Current:
   Terminology specific to GNAP is defined in the terminology section of
   the core specification [GNAP]. The following protocol roles are 
   defined: authorization server (AS), client, end user, resource owner (RO), 
   and resource server (RS). The following protocol elements are defined: 
   access token, attribute, grant, privilege, protected resource, right, 
   subject, and subject information. The same definitions are used in this 
   document.
-->


3) <!--[rfced] To avoid the "[JWT]" citation being used as an adjective,
may we update "[JWT] formatted token" to "JSON-formatted token
[JWT]" or "JSON Web Token [JWT]" or otherwise? Note that there are 
9 instances in the document.

Original:
   In a [JWT] formatted token or a token introspection response, this
   corresponds to the iss claim.

Perhaps:
   In a JSON-formatted token [JWT] or a token introspection response,
   this corresponds to the iss claim.

Or:
   In a JSON Web Token [JWT] or a token introspection response,
   this corresponds to the iss claim.
-->


4) <!--[rfced] FYI, we updated the following text for clarity and to make 
the second sentence a complete sentence. Please review whether the
updates are accurate.

Original:
   GNAP access tokens can have multiple data flags associated with them 
   that indicate special processing or considerations for the token.
   For example, whether the token is a bearer token, or should be
   expected to be durable across grant updates.

Current:
   GNAP access tokens can have multiple associated data flags that
   indicate special processing or considerations for a token.  For
   example, the data flags can indicate whether a token is a bearer
   token or should be expected to be durable across grant updates.
-->


5) <!--[rfced] We updated "RS's" to "one or more RSs" in the following
text.  We also updated "from others usable at" to "from other
access tokens used at" in the first paragraph for consistency
with the second paragraph. Please let us know if any of these
changes are not correct.

In addition, please review the remaining instances of "RS's" and "AS's"
(singular possessive) throughout the document and let us know if any
occurrences are intended to be plural. We have updated a few instances,
e.g., "targeted to different RS's" -> "targeted to different RSs".

Original:
   When an access token is used for the grant continuation API defined
   in Section 5 of [GNAP] (the continuation access token) the token
   management API defined in Section 6 of [GNAP] (the token management
   access token), or the RS-facing API defined in Section 3 (the
   resource server management access token), the AS MUST separate these
   access tokens from others usable at RS's.
   [...]

   For continuation access tokens and token management access tokens, a
   client instance MUST take steps to differentiate these special-
   purpose access tokens from access tokens used at RS's.

Current:
   When an access token is used for the grant continuation API defined
   in Section 5 of [GNAP] (the continuation access token), the token
   management API defined in Section 6 of [GNAP] (the token management
   access token), or the RS-facing API defined in Section 3 (the
   resource server management access token), the AS MUST separate these
   access tokens from other access tokens used at one or more RSs.
   [...]

   For continuation access tokens and token management access tokens, a
   client instance MUST take steps to differentiate these special-
   purpose access tokens from access tokens used at one or more RSs.
-->


6) <!-- [rfced] [GNAP] does not contain Section 3.1.2. Please let us know
which section was intended (perhaps Section 3.2.1 ("Single Access
Token").

Original:
   The client instance is given token management access tokens only 
   as part of the manage field of the grant response in Section 3.1.2 
   of [GNAP].
-->


7) <!--[rfced] In the lists in Sections 3.1 and 3.5, we note that the key
words (REQUIRED, OPTIONAL, etc.) are included at the end of the
descriptions whereas the key words are included at the beginning
of the descriptions in all other relevant sections. Would you
like to make these consistent by updating Sections 3.1 and 3.5 as
shown in the example below?

One example

Current:
   token_formats_supported (array of strings):  A list of token formats
     supported by this AS.  The values in this list MUST be registered
     in the "GNAP Token Format Registry Formats" registry in Section 5.3.  
     OPTIONAL.

Perhaps:
   token_formats_supported (array of strings):  OPTIONAL. A list of token 
     formats supported by this AS.  The values in this list MUST be 
     registered in the "GNAP Token Format Registry Formats" registry per 
     Section 5.3.  
-->


8) <!--[rfced] Please note the mismatch here between
"array of strings" vs. "string".

As both of these seem to be regarding the "GNAP Resource Set Registration
Request Parameters" registry (as opposed to the "GNAP RS-Facing Discovery
Document Fields" registry), should Section 3.4 be updated to "string" to match
the registry?

Section 3.4
   token_formats_supported (array of strings):  

vs.

Section 5.6.2:
   token_formats_supported      | string          | Section 3.4 
-->


9) <!--[rfced] We are having trouble parsing the following text (are some
words missing?). Please let us know how we may update this
sentence for clarity.

Original:
   token_formats_supported (array of strings):  OPTIONAL.  The token
      formats the RS is able to process for accessing the resource. 

Perhaps:
   token_formats_supported (array of strings):  OPTIONAL. The list of 
      token formats the RS is able to process in order to access the 
      resources.
-->


10) <!--[rfced] We note "HTTP 400 Bad Request error" vs. "HTTP (Bad
Request) status code". Should this perhaps be updated as "HTTP
400 (Bad Request) error code" for consistency as shown below?

Original:
   If the registration fails, the AS returns an HTTP 400 Bad Request
   error to the RS indicating that the registration was not successful.

   In the case of an error from the RS-facing API, the AS responds to
   the RS with an HTTP 400 (Bad Request) status code and a JSON object
   consisting of a single error field, which is either an object or a
   string.

Perhaps:
   If the registration fails, the AS returns an HTTP 400 (Bad Request)
   error code to the RS indicating that the registration was not 
   successful.

   In the case of an error from the RS-facing API, the AS responds to
   the RS with an HTTP 400 (Bad Request) error code and a JSON object
   consisting of a single error field, which is either an object or a
   string.
-->


11) <!--[rfced] FYI, for the sourcecode element in Section 4,
two spaces were removed from the left side of the access_token
so that it fits the line-length restriction. Please let us know 
if you prefer otherwise.

This line was previously too long:
    "existing_access_token": "OS9M2PMHKUR64TB8N6BW7OZB8CDFONP219RP1LT0"
-->


12) <!--[rfced] Regarding variations of "string/object"
in the "GNAP Token Introspection Request" registry.

a) In Table 2 (which corresponds to
https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-token-introspection-request)
would you like to change this type from
"object/string" to "string/object" to match the form of the subsequent item?
If so, we will ask IANA to update the registry accordingly.

Original:
   resource_server      object/string             Section 3.3 of RFC xxxx 

   access               array of strings/objects  Section 3.3 of RFC xxxx 


Perhaps:
   resource_server      string/object             Section 3.3 of RFC 9767 

   access               array of strings/objects  Section 3.3 of RFC 9767 


b) Similarly, in Section 3.3, would you like to change
"string or object" to "string/object"?
(Note: If you decide not to change the original "object/string" above,
then we will update "string or object" to "object/string" to 
match.)

Original:
   resource_server (string or object):  REQUIRED. ...

   access (array of strings/objects):  OPTIONAL. ...


Perhaps:
   resource_server (string/object):  REQUIRED. ...

   access (array of strings/objects):  OPTIONAL. ...
-->


13) <!--[rfced] Regarding variations of "string/object"
in the "GNAP Token Introspection Response" 
and "GNAP Resource Set Registration Request Parameters" registries.

a) In Table 3, would you like to change "object/string"
to "string/object" to match usage in the preceding item?  
If so, we will ask IANA to update the registry 
(https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-token-introspection-response)
 accordingly.

Original:
| access      | array of strings/objects | Section 3.3 of RFC xxxx |
| key         | object/string            | Section 3.3 of RFC xxxx |

Perhaps:
| access      | array of strings/objects | Section 3.3 of RFC 9767 |
| key         | string/object            | Section 3.3 of RFC 9767 |


b) Similarly, in Section 3.3, would you like to change "object/string"
to "string/object" to match usage in the preceding item? 

Original:
   key (object/string):  REQUIRED if ...

Perhaps:
   key (string/object):  REQUIRED if ...


c) With the same rationale, in Section 3.4 (and Table 4), would you like 
to change this as follows? If so, we will ask IANA to update the registry
(https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-resource-set-registration-request-parameters)
 accordingly.

Original: resource_server (string or object)

Perhaps:  resource_server (string/object)
-->


14) <!--[rfced] May we update this sentence for clarity?

Original:
   The contents of the access token model divulge to the RS information
   about the access token's context and rights. 

Perhaps:
   The contents of the access token model, which contains information
   about the access token's context and rights, are divulged to the RS. 
-->


15) <!--[rfced] Would using "certain circumstances" in place of "limited
circumstances" be better to avoid the redundancy of "limiting" and
"limited" as shown below?

Original:
   Furthermore, limiting the use of bearer tokens and AS-provided keys
   to only highly trusted AS's ASs and limited circumstances prevents the
   attacker from being able to willingly exfiltrate their token to an
   unsuspecting client instance.

Perhaps:
   Furthermore, limiting the use of bearer tokens and AS-provided keys
   to only highly trusted ASs and certain circumstances prevents the
   attacker from being able to willingly exfiltrate their token to an
   unsuspecting client instance.
-->


16) <!-- [rfced] The URL <https://www.ndss-symposium.org/ndss2014/
ndss-2014-programme/macaroons-cookies-contextual-caveats-
decentralized-authorization-cloud/> provides an open-access link
to this symposium paper and is where the DOI for this paper 
directs. May we replace the original URL with this URL as
shown below?

Current:
   [MACAROON] Birgisson, A., Politz, J. G., Erlingsson, U., Taly, A.,
              Vrable, M., and M. Lentczner, "Macaroons: Cookies with
              Contextual Caveats for Decentralized Authorization in the
              Cloud", NDSS Symposium 2014, DOI 10.14722/ndss.2014.23212,
              February 2014, <https://research.google/pubs/pub41892/>.

Perhaps:
   [MACAROON] Birgisson, A., Politz, J. G., Erlingsson, U., Taly, A.,
              Vrable, M., and M. Lentczner, "Macaroons: Cookies with
              Contextual Caveats for Decentralized Authorization in the
              Cloud", NDSS Symposium 2014, DOI 10.14722/ndss.2014.23212,
              February 2014, <https://www.ndss-symposium.org/ndss2014/
              ndss-2014-programme/macaroons-cookies-contextual-caveats-
              decentralized-authorization-cloud/>.
-->


17) <!-- [rfced] FYI: To match other usage in the document, we updated the first
artwork element in Section 3.2 to sourcecode and set the type to
"http-message". Please let us know if we need to update otherwise.

Additionally, please review the "type" attribute of each sourcecode element
in the XML file to ensure correctness. If the current list of preferred
values for "type"
(https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types)
does not contain an applicable type, then feel free to let us know.
Also, it is acceptable to leave the "type" attribute not set.  
-->


18) <!-- [rfced] Please review usage of <tt> and <em> in this document
and let us know if any updates are needed.

In the HTML and PDF outputs, the text enclosed in <tt> is output
in fixed-width font. In the TXT output, there are no changes to the font,
and quotation marks are not generated.

In the HTML and PDF outputs, the text enclosed in <em> is output in
italics. In the TXT output, the text enclosed in <em> appears with an
underscore before and after.  This is used only in Section 2.1.1.
-->


19) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.
-->


Thank you.

RFC Editor/kc/ar


On Apr 10, 2025, rfc-edi...@rfc-editor.org wrote:

*****IMPORTANT*****

Updated 2025/04/10

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

  Please review and resolve any questions raised by the RFC Editor 
  that have been included in the XML file as comments marked as 
  follows:

  <!-- [rfced] ... -->

  These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

  Please ensure that you review any changes submitted by your 
  coauthors.  We assume that if you do not speak up that you 
  agree to changes submitted by your coauthors.

*  Content 

  Please review the full content of the document, as this cannot 
  change once the RFC is published.  Please pay particular attention to:
  - IANA considerations updates (if applicable)
  - contact information
  - references

*  Copyright notices and legends

  Please review the copyright notice and legends as defined in
  RFC 5378 and the Trust Legal Provisions 
  (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

  Please review the markup in the XML file to ensure that elements of  
  content are correctly tagged.  For example, ensure that <sourcecode> 
  and <artwork> are set correctly.  See details at 
  <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

  Please review the PDF, HTML, and TXT files to ensure that the 
  formatted output, as generated from the markup in the XML file, is 
  reasonable.  Please note that the TXT will have formatting 
  limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

  *  your coauthors

  *  rfc-edi...@rfc-editor.org (the RPC team)

  *  other document participants, depending on the stream (e.g., 
     IETF Stream participants are your working group chairs, the 
     responsible ADs, and the document shepherd).

  *  auth48archive@rfc-editor.org, which is a new archival mailing list 
     to preserve AUTH48 conversations; it is not an active discussion 
     list:

    *  More info:
       
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

    *  The archive itself:
       https://mailarchive.ietf.org/arch/browse/auth48archive/

    *  Note: If only absolutely necessary, you may temporarily opt out 
       of the archiving of messages (e.g., to discuss a sensitive matter).
       If needed, please add a note at the top of the message that you 
       have dropped the address. When the discussion is concluded, 
       auth48archive@rfc-editor.org will be re-added to the CC list and 
       its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
— OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
  https://www.rfc-editor.org/authors/rfc9767.xml
  https://www.rfc-editor.org/authors/rfc9767.html
  https://www.rfc-editor.org/authors/rfc9767.pdf
  https://www.rfc-editor.org/authors/rfc9767.txt

Diff file of the text:
  https://www.rfc-editor.org/authors/rfc9767-diff.html
  https://www.rfc-editor.org/authors/rfc9767-rfcdiff.html (side by side)

Diff of the XML: 
  https://www.rfc-editor.org/authors/rfc9767-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9767

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9767 (draft-ietf-gnap-resource-servers-09)

Title            : Grant Negotiation and Authorization Protocol Resource Server 
Connections
Author(s)        : J. Richer, Ed., F. Imbault
WG Chair(s)      : Yaron Sheffer, Leif Johansson
Area Director(s) : Deb Cooley, Paul Wouters

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to