On Wed, Apr 9, 2025 at 4:00 PM <rfc-edi...@rfc-editor.org> wrote:

> Authors,
>
> While reviewing this document during AUTH48, please resolve (as necessary)
> the following questions, which are also in the XML file.
>
> 1) <!-- [rfced] Section 1:  This sentence does not parse.  As it appears
> that "then fetch" means "then the client fetches", may we update as
> suggested below?
>
> Original:
>  In other cases, it may be
>  dynamically discovered; for example, a user could enter their email
>  address into an email client, the client could perform WebFinger
>  [RFC7033] discovery (in a manner related to the description in
>  Section 2 of "OpenID Connect Discovery 1.0" [OpenID.Discovery]) to
>  find the resource server, then fetch the resource server metadata to
>  find the authorization server to use to obtain authorization to
>  access the user's email.
>
> Suggested:
>  In
>  other cases, it may be dynamically discovered; for example, a user
>  could enter their email address into an email client, the client
>  could perform WebFinger discovery [RFC7033] (in a manner related to
>  the description in Section 2 of [OpenID.Discovery]) to find the
>  resource server, and the client could then fetch the resource server
>  metadata to find the authorization server to use to obtain
>  authorization to access the user's email. -->
>

Agreed, thanks for the suggested text.


>
>
> 2) <!-- [rfced] Section 1:  We changed "Software Statement" to "software
> statement" per the text of RFC 7591 and changed "Dynamic Client
> Registration" to "dynamic client registration" per RFCs 7591, 9700,
> and 9701.  Please let us know any objections.
>
> Original:
>  This is
>  analogous to the role that the Software Statement plays in OAuth
>  Dynamic Client Registration [RFC7591].
>
> Currently:
>  This is
>  analogous to the role that the software statement plays in OAuth
>  dynamic client registration [RFC7591]. -->
>

We agree with lowercase "software statement", but "Dynamic Client
Registration" should be capitalized, as it's the name of RFC 7591.



>
>
> 3) <!-- [rfced] Section 1:  We had trouble parsing this sentence.  We
> removed the comma before "but that" to clarify that "that" refers
> to attacker-generated metadata and is not used as a noun.  If this
> update is incorrect, please clarify what "but that" refers to.
>
> Original:
>  This prevents attackers from publishing metadata supposedly
>  describing the protected resource, but that is not actually
>  authoritative for the protected resource, as described in
>  Section 7.3.
>
> Currently:
>  This prevents attackers from publishing metadata that supposedly
>  describes the protected resource but that is not actually
>  authoritative for the protected resource, as described in
>  Section 7.3. -->
>
>
Agreed.


>
> 4) <!-- [rfced] Sections 1 and subsequent:  Please review and advise
> regarding the usage of "<tt>" for certain values and parameters as
> listed in the XML file for this document.  For example, we see
> 2 instances of (OAuth 2.0) "<tt>scope</tt> values" and 1 instance of
> "scope values".  Should usage be consistent?  Also, please review the
> parameters listed in Sections 2 and 8.1.2; no <tt>s for parameters
> listed in Section 2, but parameters listed in Section 8.1.2 (except
> for "signed_metadata"; see below) are enclosed in <tt>s.
>
> A few more examples:
>  "alg values":  2 instances with <tt>, 2 without
>  GET ("<tt>GET</tt> request" vs. "the GET")
>  <dt>Metadata Name:</dt><dd>signed_metadata</dd> (Section 8.1.2)
>   (All other parameter names in Section 8.1.2 that follow
>   "Metadata Name: " are enclosed in <tt>s.) -->
>
>
We intend to call out parameter names with <tt>, but not use that markup
when referring to the concept. So in the case of all 3 occurrences of
"scope values", these are not referring to the parameter names so the <tt>
should be removed.

For "alg values", "alg" is a parameter name in JWT, so that should always
be wrapped in <tt>.

The instance of "the GET" should be corrected to "the <tt>GET</tt> request".

"signed_metadata" is missing the <tt> wrapper as well.


> 5) <!-- [rfced] Sections 1 and 2:  We had trouble determining what
> "for instance" refers to in these sentences.  For example, in the
> first sentence listed below, we do not see any mention of
> "jwks_uri" in [FAPI.MessageSigning] (although we see "jwks_uri"
> in Section 2 of this document as well as RFCs 7591, 7592, 8414,
> 8705, 8725, 9068, 9700, and 9701, but [FAPI.MessageSigning] does not
> mention any of these published RFCs, except for one mention of
> RFC 8705 ("This is outside of the scope of both [RFC8705] and the
> FAPI standards")).  Could these sentences be reworded to make them
> clearer?
>
> Original:
>  These values may be
>  used by other specifications, such as the jwks_uri used to publish
>  public keys the resource server uses to sign resource responses, for
>  instance, as described in [FAPI.MessageSigning].
> ...
>  JSON array containing a list of the JWS [JWS] signing
>     algorithms (alg values) [JWA] supported by the protected resource
>     for signing resource responses, for instance, as described in
>     [FAPI.MessageSigning].
>
> Possibly:
>  These values may be
>  used by other specifications, such as the jwks_uri (see Section 2)
>  used to publish public keys the resource server uses to sign
>  resource responses, as described in [FAPI.MessageSigning].
> ...
>  JSON array containing a list of the JWS [JWS] signing
>     algorithms (alg values) [JWA] supported by the protected resource
>     for signing resource responses - for instance, as described in
>     [FAPI.MessageSigning]. -->
>

Please use this wording, as we identified another ambiguity in the previous
wording:

These values, such as the <tt>jwks_uri</tt> (see Section 2), may be used
with
other specifications; for example, the public keys published in the
<tt>jwks_uri</tt> can be
used to verify the signed resource responses, as described in
[FAPI.MessageSigning].



>
>
> 6) <!-- [rfced] Section 1.1:  "uses of ... utilize", which also means
> "uses of ... uses", read oddly.  We changed "uses of" to
> "applications of".  Please let us know any objections.
>
> Original:
>  All uses of JSON Web Signature (JWS) [JWS] and JSON Web Encryption
>  (JWE) [JWE] data structures in this specification utilize the JWS
>  Compact Serialization or the JWE Compact Serialization; the JWS JSON
>  Serialization and the JWE JSON Serialization are not used.
>
> Currently:
>  All applications of JSON Web Signature (JWS) data structures [JWS]
>  and JSON Web Encryption (JWE) data structures [JWE] as discussed in
>  this specification utilize the JWS Compact Serialization or the JWE
>  Compact Serialization; the JWS JSON Serialization and the JWE JSON
>  Serialization are not used. -->
>
>
Agreed.


>
> 7) <!-- [rfced] Section 1.2:  This text says "This specification uses
> the terms ...", but except for a few terms (e.g., "Client
> Authentication" (only used in the title of Section 5.3), "Claim
> Name", "Authorization Code"), we could not find any instances of the
> following terms anywhere in the text:
> Authorization Endpoint, Authorization Grant, Client Secret, Grant
> Type, Redirection URI, Refresh Token, Resource Owner, Response Type,
> Token Endpoint, and Claim Value.
>
> We see that this paragraph was taken from Section 1.2 of RFC 8414.
> We also see similar paragraphs in several other post-6000 RFCs.
>
> The following terms are lowercased in text everywhere else in this
> document.  Should we lowercase them in this list as well?
>
> Access Token, Authorization Server, Client, Client Identifier,
> Protected Resource, and Resource Server
>
> We see that the terms listed as being from RFC 6749 are lowercased
> in RFC 6749.  Lowercase versus uppercase for the terms listed as
> being in [JWT] (RFC 7519) is mixed.
>
> If all of these terms are relevant to this document, should the text
> be reworded to suggest that readers be familiar with them?  If not,
> could this paragraph be (1) updated to tailor it to this document, as
> was done in RFCs 9470 and 9700 or (2) removed?
>
> Original:
>  This specification uses the terms "Access Token", "Authorization
>  Code", "Authorization Endpoint", "Authorization Grant",
>  "Authorization Server", "Client", "Client Authentication", "Client
>  Identifier", "Client Secret", "Grant Type", "Protected Resource",
>  "Redirection URI", "Refresh Token", "Resource Owner", "Resource
>  Server", "Response Type", and "Token Endpoint" defined by OAuth 2.0
>  [RFC6749], the terms "Claim Name", "Claim Value", and "JSON Web Token
>  (JWT)" defined by JSON Web Token (JWT) [JWT]. -->
>
>
Yes, let's delete the terms we're not using, and use quoted lowercase terms
so that it matches RFC 9449, RFC 9470, and RFC 9700.


>
> 8) <!-- [rfced] Sections 2 and 8.1.2:  We changed "Bearer Token" to
> "bearer token" per RFC 6750.  Please let us know any objections.
>
> If no objections, we will ask IANA to change "Bearer Token" to
> "bearer token" in the "OAuth Protected Resource Metadata" registry
> on <https://www.iana.org/assignments/oauth-parameters/> just prior to
> publication.
>
> Original:
>  JSON array containing a list of the supported methods
>     of sending an OAuth 2.0 Bearer Token [RFC6750] to the protected
>     resource.
> ...
>  *  Metadata Description: JSON array containing a list of the OAuth
>     2.0 Bearer Token presentation methods that this protected resource
>     supports
>
> Currently:
>  JSON array containing a list of the supported methods
>     of sending an OAuth 2.0 bearer token [RFC6750] to the protected
>     resource.
> ...
>  Metadata Description:  JSON array containing a list of the OAuth 2.0
>     bearer token presentation methods that this protected resource
>     supports -->
>
>
Agreed, when "bearer token" is referring to the type of token (rather than
referring to RFC 6750) it should be lowercase.


>
> 9) <!-- [rfced] Section 2.2:  For ease of the reader, we provided a
> brief explanation of the term "MACed" per RFC 7591.  Please let us
> know any objections.
>
> Original:
>  The signed metadata MUST be
>  digitally signed or MACed using JSON Web Signature (JWS) [JWS] and
>  MUST contain an iss (issuer) claim denoting the party attesting to
>  the claims in the signed metadata.
>
> Currently:
>  The signed metadata MUST be
>  digitally signed or MACed (protected with a Message Authentication
>  Code) using a JSON Web Signature (JWS) [JWS] and MUST contain an iss
>  (issuer) claim denoting the party attesting to the claims in the
>  signed metadata. -->
>
>
Agreed.


>
> 10) <!-- [rfced] Please review the four sourcecode entries in this
> document, and let us know if you would like to specify a type.
> For example, should the first and second sourcecode items have the
> type set to "http-message", and should the third and fourth
> sourcecode items have the type set to "json"?  Please review and
> advise.
>
> If the current list of preferred values for "type"
> (https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types)
> does not contain an applicable type, please let us know.  Also, it is
> acceptable to leave the "type" attribute unset. -->
>
>
All should be set to type "http-message".


>
> 11) <!-- [rfced] Section 4:  Please confirm that "OAuth protected
> resources for protected resources" is as intended.
>
> Original:
>  protected_resources
>     OPTIONAL.  JSON array containing a list of resource identifiers
>     for OAuth protected resources for protected resources that can be
>     used with this authorization server. -->
>
>
That looks like a duplicate "for protected resources", please delete, so
that it reads:

  protected_resources
    OPTIONAL.  JSON array containing a list of resource identifiers
    for OAuth protected resources that can be
    used with this authorization server.


>
> 12) <!-- [rfced] Figure 1:  We see that the bottom set of boxes for
> "Client", "Resource Server", and "Authorization Server" appear in the
> SVG but not the ASCII art.  Please update so that the ASCII art and
> the SVG match.
> -->
>
>
Thanks for flagging the inconsistency. Please add this to the bottom of the
diagram:

     +----+-----+              +----+-----+    +-------+-------+
     |  Client  |              | Resource |    | Authorization |
     |          |              |  Server  |    |    Server     |
     +----------+              +----------+    +---------------+


>
> 13) <!-- [rfced] Section 5:  The descriptive text regarding the steps
> shown in Figure 1 doesn't seem to align with the steps shown in
> Figure 1:
>
> In Figure 1:
> Step 5 is "Validate ..." and "... Build ..."
> Step 6 is "Fetch ..."
>
> In the text:
> Step 5 is "... validates ..."
> Step 6 is "... builds ..." and "... makes a request to fetch ..."
>
> May we update the descriptive text as suggested below?
>
> Original:
>  | 5. Validate RS Metadata |         |                  |
>  | Build AS Metadata URL   |         |                  |
> ...
>            |   6. Fetch AS Metadata  |                  |
> ...
>  5.   The client validates the protected resource metadata, as
>       described in Section 3.3.
>
>  6.   The client builds the authorization server metadata URL from an
>       issuer identifier in the resource metadata according to
>       [RFC8414] and makes a request to fetch the authorization server
>       metadata.
>
> Suggested (easier to change the text than the figure):
>  5.   The client validates the protected resource metadata, as
>       described in Section 3.3, and builds the authorization server
>       metadata URL from an issuer identifier in the resource metadata
>       according to [RFC8414].
>
>  6.   The client makes a request to fetch the authorization server
>       metadata. -->
>
>
Thanks.


>
> 14) <!-- [rfced] Section 5.3:  Does "scenarios where" also apply to the
> text after "and", or is the text after "and" a separate thought?  If
> the former, may we update as suggested?
>
> Original:
>  This specification is intended to be deployed in scenarios where the
>  client has no prior knowledge about the resource server, and the
>  resource server might or might not have prior knowledge about the
>  client.
>
> Suggested:
>  This specification is intended to be deployed in scenarios where the
>  client has no prior knowledge about the resource server and where
>  the resource server might or might not have prior knowledge about
>  the client. -->
>
> Looks good.


>
> 15) <!-- [rfced] Section 6:  "such as resource" looked odd in the text
> output, so we placed "resource" in quotes per 'The name requested
> (e.g., "resource")' in Section 8.1.1.  Please let us know any
> objections.
>
> Original:
>  For example, the member names in the
>  metadata response might be compared to specific member names such as
>  resource.
>
> Currently:
>  For example, the member names in the
>  metadata response might be compared to specific member names such as
>  "resource". -->
>
>
We should use <tt>resource</tt> for consistency, since this is actually a
parameter name.


>
> 16) <!-- [rfced] Section 7.6:  We had trouble determining what "or which
> could be published" refers to.  If the suggested text is not correct,
> please clarify.
>
> Original:
>  For
>  instance, some protected resources are used with a fixed
>  authorization server or set of authorization servers, the locations
>  of which may be well known, or which could be published as metadata
>  values by the protected resource.
>
> Suggested (guessing that the location information could be published):
>  For
>  instance, some protected resources are used with a fixed
>  authorization server or set of authorization servers, the locations
>  of which may be well known or could be published by the protected
>  resource as metadata values. -->
>
>
Maybe we can make this even more explicit by separating it into multiple
sentences:

For instance, some protected resources are used with a fixed authorization
server or a set of authorization servers, the locations of which may be
known via out-of-band mechanisms. Alternatively, as described in this
specification, the locations of the authorization servers could be
published by the protected resource as metadata values.


>
> 17) <!-- [rfced] Section 7.9:  We see "PKIX" mentioned in RFC 9525 but
> not standalone "PKI".  Would you prefer to mention "PKIX" instead of
> "PKI" here?
>
> Original:
>  This means that its security is dependent upon
>  the Internet Public Key Infrastructure (PKI) [RFC9525].
>
> Possibly:
>  This means that its security is dependent
>  upon the Internet Public Key Infrastructure using X.509 (PKIX)
>  [RFC9525]. -->
>
>
Please use:

This means that its security is dependent
upon the Internet Public Key Infrastructure using X.509 (PKIX),
as described in [RFC9525].


>
> 18) <!-- [rfced] Section 7.10:  RFC 7234 has been obsoleted by RFC 9111.
> Because we see "Cache-Control" and "max-age" discussed in RFC 9111 as
> well, we updated the RFC number accordingly.  Please let us know any
> objections.
>
> Original ("utlize" has been fixed):
>  Implementations should utlize HTTP
>  caching directives such as Cache-Control with max-age, as defined in
>  [RFC7234], to enable caching of retrieved metadata for appropriate
>  time periods.
> ...
>  [RFC7234]  Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
>             Ed., "Hypertext Transfer Protocol (HTTP/1.1): Caching",
>             RFC 7234, DOI 10.17487/RFC7234, June 2014,
>             <https://www.rfc-editor.org/info/rfc7234>.
>
> Currently:
>  Implementations should utilize HTTP
>  caching directives such as Cache-Control with max-age, as defined in
>  [RFC9111], to enable caching of retrieved metadata for appropriate
>  time periods.
> ...
>  [RFC9111]  Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
>             Ed., "HTTP Caching", STD 98, RFC 9111,
>             DOI 10.17487/RFC9111, June 2022,
>             <https://www.rfc-editor.org/info/rfc9111>. -->
>
>
Agreed.


>
> 19) <!-- [rfced] We have removed this first paragraph, as it seems
> unnecessary.  Please review.
>
> Original:
>    The following registration procedure is used for the registry
>    established by this specification.
> -->
>
>
Ok.


>
> 20) <!-- [rfced] To clarify the text, please consider the following
> update.  Currently, it is unclear whether mail sent to the list
> initiates review or if it is where the expert sends the comments.
> In addition, does the text need to mention Designated Experts,
> because Expert Review is already part of Specification Required?
>
> Original:
>    Values are registered on a Specification Required [RFC8126] basis
>    after a two-week review period on the oauth-ext-rev...@ietf.org
>    mailing list, on the advice of one or more Designated Experts.
>
> Perhaps:
>    Values are registered per Specification Required [RFC8126].
>    Registration requests should be sent to <oauth-ext-rev...@ietf.org>
>    to initiate a two-week review period.
> -->
>
> We don’t intend there to be anything unique to this spec with regards to
the review process. Any corrections here are acceptable.


>
> 21) <!-- [rfced] Note that we have updated the text as follows based on
> discussion with IANA.  Please let us know if you have concerns.
>
> Original:
>    The IANA escalation process is followed when the designated experts
>    are not responsive within 14 days.
>
> Current:
>    If the designated experts are not responsive, the registration
> requesters
>    should contact IANA to escalate the process.
> -->
>
> Looks good.


>
> 22) <!-- [rfced] For clarity, please consider whether "makes sense" should
> be "is clear and fits the purpose of the registry"?  In addition, we
> suggest stating the criteria clearly (i.e., is the designated expert
> supposed to approve or not approve proposals that duplicate
> functionality).
>
> Original:
>    Criteria that should be applied by the Designated Experts includes
>    determining whether the proposed registration duplicates existing
>    functionality, whether it is likely to be of general
>    applicability or is useful only for a single application,
>    and whether the registration makes sense.
>
> Perhaps:
>    Designated experts should apply the following criteria when reviewing
>    proposed registrations: they must be unique, that is, they should not
>    duplicate existing functionality; they are likely generally applicable,
>    as opposed to being used for a single application; and they are clear
>    and fit the purpose of the registry.
> -->
>
> Agreed.


>
> 23) <!-- [rfced] This sentence is tough to parse.  Please consider the
> following update for clarity.
>
> Original:
>    The reason to allow the Designated Experts to allocate values prior
>    to publication as a final specification is to enable giving authors
>    of specifications proposing registrations the benefit of review by
>    the Designated Experts before the specification is completely done,
>    so that if problems are identified, the authors can iterate and fix
>    them before publication of the final specification.
>
> Perhaps:
>    Designated experts may allocate values prior to publication of the
>    final specification.  This allows authors to receive guidance from
>    the designated experts early, so any identified issues can be fixed
>    before the final specification is published.
> -->
>
> Looks good.


>
> 24) <!-- [rfced] [USA15] Do you want to specifically refer to the 2015
> version of the standard, or do you want to refer to the most current
> version?  Currently, we have updated this reference listing to primarily
> refer to the 2015 version, and we have included a second link to the curent
> version.  Please review.
>
> Original:
>  [USA15]    Davis, M. and K. Whistler, "Unicode Normalization Forms",
>             Unicode Standard Annex 15, 1 June 2015,
>             <https://www.unicode.org/reports/tr15/>.
>
> Currently:
>  [USA15]    Davis, M., Ed. and K. Whistler, Ed., "Unicode
>             Normalization Forms", Unicode Standard Annex #15, 1 June
>             2015, <https://www.unicode.org/reports/tr15/tr15-43.html>.
>             Latest version available at
>             <https://www.unicode.org/reports/tr15/>. -->
>
> The most current version would be best.


>
> 25) <!-- [rfced] Acknowledgements:  We found that all names were listed
> in alphabetical order by last name, except for Gabriel Corona.  We
> moved Gabriel's name so that it appears after Deb Cooley's name
> instead of Roman Danyliw's name.  Please let us know any objections.
>
> Original:
>  We would would also like to thank Amanda
>  Baber, Mike Bishop, Ralph Bragg, Brian Campbell, Deb Cooley, Roman
>  Danyliw, Gabriel Corona, Vladimir Dzhuvinov, George Fletcher, Arnt
>  Gulbrandsen, Pieter Kasselman, Murray Kucherawy, David Mandelberg,
>  Tony Nadalin, Francesca Palombini, John Scudder, Rifaat Shekh-Yusef,
>  Filip Skokan, Orie Steele, Atul Tulshibagwale, Éric Vyncke, Paul
>  Wouters, and Bo Wu for their contributions to the specification.
>
> Currently ("would would" has been fixed):
>  We would also like to thank Amanda Baber,
>  Mike Bishop, Ralph Bragg, Brian Campbell, Deb Cooley, Gabriel Corona,
>  Roman Danyliw, Vladimir Dzhuvinov, George Fletcher, Arnt Gulbrandsen,
>  Pieter Kasselman, Murray Kucherawy, David Mandelberg, Tony Nadalin,
>  Francesca Palombini, John Scudder, Rifaat Shekh-Yusef, Filip Skokan,
>  Orie Steele, Atul Tulshibagwale, Éric Vyncke, Paul Wouters, and Bo Wu
>  for their contributions to the specification. -->
>
> Looks good, thanks.


>
> 26) <!-- [rfced] Please review the "Inclusive Language" portion of the
> online Style Guide at
> <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>,
> and let us know if any changes are needed.  Updates of this nature
> typically result in more precise language, which is helpful for
> readers.
>
> For example, please consider whether the following should be updated:
>
>  man-in-the-middle -->
>
> We believe “man-in-the-middle” can be removed from the sentence without
affecting its meaning. Please do so.


>
> 27) <!-- [rfced] The following terms were used inconsistently in this
> document.  We chose to use the latter forms.  Please let us know any
> objections.
>
>  Protected resource (1 instance) ("The Protected resource's") /
>    protected resource (108 instances)
>
>  Resource Identifier (1 instance in text) ("The protected resource's
>    Resource Identifier") / resource identifier (19 instances in text)
>    ("The protected resource's resource identifier") -->
>
> Agreed.


>
> Thank you.
>
> RFC Editor
>
>
In this review, we also identified a mistake in an example. Please update
the example in Section 5.1 as described in this pull request:
https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata/pull/65/files

(Lines 892-895 replaced with the below)

  HTTP/1.1 401 Unauthorized
  WWW-Authenticate: Bearer resource_metadata=

Thanks for the thorough review.


>
>
> On Apr 9, 2025, at 3:52 PM, rfc-edi...@rfc-editor.org wrote:
>
> *****IMPORTANT*****
>
> Updated 2025/04/09
>
> RFC Author(s):
> --------------
>
> Instructions for Completing AUTH48
>
> Your document has now entered AUTH48.  Once it has been reviewed and
> approved by you and all coauthors, it will be published as an RFC.
> If an author is no longer available, there are several remedies
> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
>
> You and you coauthors are responsible for engaging other parties
> (e.g., Contributors or Working Group) as necessary before providing
> your approval.
>
> Planning your review
> ---------------------
>
> Please review the following aspects of your document:
>
> *  RFC Editor questions
>
>    Please review and resolve any questions raised by the RFC Editor
>    that have been included in the XML file as comments marked as
>    follows:
>
>    <!-- [rfced] ... -->
>
>    These questions will also be sent in a subsequent email.
>
> *  Changes submitted by coauthors
>
>    Please ensure that you review any changes submitted by your
>    coauthors.  We assume that if you do not speak up that you
>    agree to changes submitted by your coauthors.
>
> *  Content
>
>    Please review the full content of the document, as this cannot
>    change once the RFC is published.  Please pay particular attention to:
>    - IANA considerations updates (if applicable)
>    - contact information
>    - references
>
> *  Copyright notices and legends
>
>    Please review the copyright notice and legends as defined in
>    RFC 5378 and the Trust Legal Provisions
>    (TLP – https://trustee.ietf.org/license-info).
>
> *  Semantic markup
>
>    Please review the markup in the XML file to ensure that elements of
>    content are correctly tagged.  For example, ensure that <sourcecode>
>    and <artwork> are set correctly.  See details at
>    <https://authors.ietf.org/rfcxml-vocabulary>.
>
> *  Formatted output
>
>    Please review the PDF, HTML, and TXT files to ensure that the
>    formatted output, as generated from the markup in the XML file, is
>    reasonable.  Please note that the TXT will have formatting
>    limitations compared to the PDF and HTML.
>
>
> Submitting changes
> ------------------
>
> To submit changes, please reply to this email using ‘REPLY ALL’ as all
> the parties CCed on this message need to see your changes. The parties
> include:
>
>    *  your coauthors
>
>    *  rfc-edi...@rfc-editor.org (the RPC team)
>
>    *  other document participants, depending on the stream (e.g.,
>       IETF Stream participants are your working group chairs, the
>       responsible ADs, and the document shepherd).
>
>    *  auth48archive@rfc-editor.org, which is a new archival mailing list
>       to preserve AUTH48 conversations; it is not an active discussion
>       list:
>
>      *  More info:
>
> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>
>      *  The archive itself:
>         https://mailarchive.ietf.org/arch/browse/auth48archive/
>
>      *  Note: If only absolutely necessary, you may temporarily opt out
>         of the archiving of messages (e.g., to discuss a sensitive matter).
>         If needed, please add a note at the top of the message that you
>         have dropped the address. When the discussion is concluded,
>         auth48archive@rfc-editor.org will be re-added to the CC list and
>         its addition will be noted at the top of the message.
>
> You may submit your changes in one of two ways:
>
> An update to the provided XML file
>  — OR —
> An explicit list of changes in this format
>
> Section # (or indicate Global)
>
> OLD:
> old text
>
> NEW:
> new text
>
> You do not need to reply with both an updated XML file and an explicit
> list of changes, as either form is sufficient.
>
> We will ask a stream manager to review and approve any changes that seem
> beyond editorial in nature, e.g., addition of new text, deletion of text,
> and technical changes.  Information about stream managers can be found in
> the FAQ.  Editorial changes do not require approval from a stream manager.
>
>
> Approving for publication
> --------------------------
>
> To approve your RFC for publication, please reply to this email stating
> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> as all the parties CCed on this message need to see your approval.
>
>
> Files
> -----
>
> The files are available here:
>    https://www.rfc-editor.org/authors/rfc9728.xml
>    https://www.rfc-editor.org/authors/rfc9728.html
>    https://www.rfc-editor.org/authors/rfc9728.pdf
>    https://www.rfc-editor.org/authors/rfc9728.txt
>
> Diff file of the text:
>    https://www.rfc-editor.org/authors/rfc9728-diff.html
>    https://www.rfc-editor.org/authors/rfc9728-rfcdiff.html (side by side)
>
> Diff of the XML:
>    https://www.rfc-editor.org/authors/rfc9728-xmldiff1.html
>
>
> Tracking progress
> -----------------
>
> The details of the AUTH48 status of your document are here:
>    https://www.rfc-editor.org/auth48/rfc9728
>
> Please let us know if you have any questions.
>
> Thank you for your cooperation,
>
> RFC Editor
>
> --------------------------------------
> RFC 9728 (draft-ietf-oauth-resource-metadata-13)
>
> Title            : OAuth 2.0 Protected Resource Metadata
> Author(s)        : M.B. Jones, P. Hunt, A. Parecki
> WG Chair(s)      : Hannes Tschofenig, Rifaat Shekh-Yusef
> Area Director(s) : Deb Cooley, Paul Wouters
>
>
>
-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to