Sure. I'll keep you posted.
Best
Fabien

On Mon, 14 Apr 2025, 23:59 Justin Richer, <jric...@mit.edu> wrote:

> OK, I think the best bet is to keep the acert.io address on the
> specification but make sure your gmail account is CC’d on the discussion,
> what do you think?
>
> I’m reviewing the final diffs now, Fabien please do the same when you get
> a chance and approve or offer changes as needed.
>
> Thanks all,
>
>  — Justin
>
> On Apr 14, 2025, at 5:52 PM, Fabien Imbault <fabien.imba...@gmail.com>
> wrote:
>
> Well actually there is an issue with the payment for some obscure reason.
> My sincere apologies, the easiest will be to change for a free account
> that I'm sure will never have that sort of issue.
>
> Please let me know if there's anything I can do to help further.
>
> Best
> Fabien
>
> On Mon, 14 Apr 2025, 23:45 Fabien Imbault, <fabien.imba...@gmail.com>
> wrote:
>
>> Hi there, I have no idea, my email account is perfectly fine and I do
>> receive ietf notifications. Yet if that's really an issue you may use
>> fabien.imba...@gmail.com if needed.
>>
>> Best regards
>> Fabien
>>
>> On Mon, 14 Apr 2025, 21:06 Justin Richer, <jric...@mit.edu> wrote:
>>
>>> Hi Karen,
>>>
>>> This happened recently with RFC9635 (GNAP Core), so I’m CC’ing his other
>>> known address as I know he’ll need to approve as well.
>>>
>>> Fabien, any idea what’s going on here, and should we update the contact
>>> info on the draft?
>>>
>>>  — Justin
>>>
>>> > On Apr 14, 2025, at 2:34 PM, Karen Moore <kmo...@staff.rfc-editor.org>
>>> wrote:
>>> >
>>> > Hi Justin,
>>> >
>>> > We received a bounced message for fabien.imba...@acert.io. Do you
>>> happen to know if Fabien has a new email address?
>>> >
>>> > Thank you.
>>> > RFC Editor/kc
>>> >
>>> >> On Apr 14, 2025, at 10:55 AM, Karen Moore <
>>> kmo...@staff.rfc-editor.org> wrote:
>>> >>
>>> >> Hi Justin,
>>> >>
>>> >> Thank you for your reply.  We have updated our files accordingly.
>>> Please review and let us know if any further changes are needed or if you
>>> approve the document in its current form. We will await approvals from each
>>> author prior to moving forward in the publication process.
>>> >>
>>> >> --FILES--
>>> >>
>>> >> The updated XML file is here:
>>> >> https://www.rfc-editor.org/authors/rfc9767.xml
>>> >>
>>> >> The updated output files are here:
>>> >> https://www.rfc-editor.org/authors/rfc9767.txt
>>> >> https://www.rfc-editor.org/authors/rfc9767.pdf
>>> >> https://www.rfc-editor.org/authors/rfc9767.html
>>> >>
>>> >> These diff files show all changes made during AUTH48:
>>> >> https://www.rfc-editor.org/authors/rfc9767-auth48diff.html
>>> >> https://www.rfc-editor.org/authors/rfc9767-auth48rfcdiff.html (side
>>> by side)
>>> >>
>>> >> These diff files show all changes made to date:
>>> >> https://www.rfc-editor.org/authors/rfcXXXX-diff.html
>>> >> https://www.rfc-editor.org/authors/rfc9767-rfcdiff.html (side by
>>> side)
>>> >>
>>> >> Note that it may be necessary for you to refresh your browser to view
>>> the most recent version. Please review the document carefully to ensure
>>> satisfaction as we do not make changes once it has been published as an RFC.
>>> >>
>>> >> For the AUTH48 status of this document, please see:
>>> >> https://www.rfc-editor.org/auth48/rfc9767
>>> >>
>>> >> Thank you,
>>> >> RFC Editor/kc
>>> >>
>>> >>
>>> >>> On Apr 11, 2025, at 2:14 PM, Justin Richer via auth48archive <
>>> auth48archive@rfc-editor.org> wrote:
>>> >>>
>>> >>>
>>> >>>
>>> >>>> On Apr 10, 2025, at 2:58 PM, rfc-edi...@rfc-editor.org wrote:
>>> >>>>
>>> >>>> Authors,
>>> >>>>
>>> >>>> While reviewing this document during AUTH48, please resolve (as
>>> necessary) the following questions, which are also in the XML file.
>>> >>>>
>>> >>>> 1) <!-- [rfced] Please insert any keywords (beyond those that
>>> appear in
>>> >>>> the title) for use on https://www.rfc-editor.org/search. -->
>>> >>>>
>>> >>>>
>>> >>>> 2) <!--[rfced] We changed this paragraph into smaller sentences
>>> >>>> for easier reading and arranged the list of items in alphabetical
>>> >>>> order. Please let us know of any objections.
>>> >>>>
>>> >>>> Original:
>>> >>>> Terminology specific to GNAP is defined in the terminology section
>>> of
>>> >>>> the core specification [GNAP], and provides definitions for the
>>> >>>> protocol roles: authorization server (AS), client, resource server
>>> >>>> (RS), resource owner (RO), end user; as well as the protocol
>>> elements:
>>> >>>> attribute, access token, grant, privilege, protected resource,
>>> right,
>>> >>>> subject, subject information. The same definitions are used in this
>>> >>>> document.
>>> >>>>
>>> >>>> Current:
>>> >>>> Terminology specific to GNAP is defined in the terminology section
>>> of
>>> >>>> the core specification [GNAP]. The following protocol roles are
>>> >>>> defined: authorization server (AS), client, end user, resource
>>> owner (RO),
>>> >>>> and resource server (RS). The following protocol elements are
>>> defined:
>>> >>>> access token, attribute, grant, privilege, protected resource,
>>> right,
>>> >>>> subject, and subject information. The same definitions are used in
>>> this
>>> >>>> document.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> This change is fine.
>>> >>>
>>> >>>>
>>> >>>> 3) <!--[rfced] To avoid the "[JWT]" citation being used as an
>>> adjective,
>>> >>>> may we update "[JWT] formatted token" to "JSON-formatted token
>>> >>>> [JWT]" or "JSON Web Token [JWT]" or otherwise? Note that there are
>>> >>>> 9 instances in the document.
>>> >>>>
>>> >>>> Original:
>>> >>>> In a [JWT] formatted token or a token introspection response, this
>>> >>>> corresponds to the iss claim.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> In a JSON-formatted token [JWT] or a token introspection response,
>>> >>>> this corresponds to the iss claim.
>>> >>>>
>>> >>>> Or:
>>> >>>> In a JSON Web Token [JWT] or a token introspection response,
>>> >>>> this corresponds to the iss claim.
>>> >>>> -->
>>> >>>
>>> >>> Let’s go with:
>>> >>>
>>> >>> In the payload of a JSON Web Token [JWT] or a token introspection
>>> response,
>>> >>> this corresponds to the iss claim.
>>> >>>
>>> >>>
>>> >>>>
>>> >>>>
>>> >>>> 4) <!--[rfced] FYI, we updated the following text for clarity and
>>> to make
>>> >>>> the second sentence a complete sentence. Please review whether the
>>> >>>> updates are accurate.
>>> >>>>
>>> >>>> Original:
>>> >>>> GNAP access tokens can have multiple data flags associated with
>>> them
>>> >>>> that indicate special processing or considerations for the token.
>>> >>>> For example, whether the token is a bearer token, or should be
>>> >>>> expected to be durable across grant updates.
>>> >>>>
>>> >>>> Current:
>>> >>>> GNAP access tokens can have multiple associated data flags that
>>> >>>> indicate special processing or considerations for a token.  For
>>> >>>> example, the data flags can indicate whether a token is a bearer
>>> >>>> token or should be expected to be durable across grant updates.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> The change is fine.
>>> >>>
>>> >>>>
>>> >>>> 5) <!--[rfced] We updated "RS's" to "one or more RSs" in the
>>> following
>>> >>>> text.  We also updated "from others usable at" to "from other
>>> >>>> access tokens used at" in the first paragraph for consistency
>>> >>>> with the second paragraph. Please let us know if any of these
>>> >>>> changes are not correct.
>>> >>>>
>>> >>>> In addition, please review the remaining instances of "RS's" and
>>> "AS's"
>>> >>>> (singular possessive) throughout the document and let us know if any
>>> >>>> occurrences are intended to be plural. We have updated a few
>>> instances,
>>> >>>> e.g., "targeted to different RS's" -> "targeted to different RSs".
>>> >>>>
>>> >>>> Original:
>>> >>>> When an access token is used for the grant continuation API defined
>>> >>>> in Section 5 of [GNAP] (the continuation access token) the token
>>> >>>> management API defined in Section 6 of [GNAP] (the token management
>>> >>>> access token), or the RS-facing API defined in Section 3 (the
>>> >>>> resource server management access token), the AS MUST separate these
>>> >>>> access tokens from others usable at RS's.
>>> >>>> [...]
>>> >>>>
>>> >>>> For continuation access tokens and token management access tokens, a
>>> >>>> client instance MUST take steps to differentiate these special-
>>> >>>> purpose access tokens from access tokens used at RS's.
>>> >>>>
>>> >>>> Current:
>>> >>>> When an access token is used for the grant continuation API defined
>>> >>>> in Section 5 of [GNAP] (the continuation access token), the token
>>> >>>> management API defined in Section 6 of [GNAP] (the token management
>>> >>>> access token), or the RS-facing API defined in Section 3 (the
>>> >>>> resource server management access token), the AS MUST separate these
>>> >>>> access tokens from other access tokens used at one or more RSs.
>>> >>>> [...]
>>> >>>>
>>> >>>> For continuation access tokens and token management access tokens, a
>>> >>>> client instance MUST take steps to differentiate these special-
>>> >>>> purpose access tokens from access tokens used at one or more RSs.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> These changes are fine.
>>> >>>
>>> >>>>
>>> >>>> 6) <!-- [rfced] [GNAP] does not contain Section 3.1.2. Please let
>>> us know
>>> >>>> which section was intended (perhaps Section 3.2.1 ("Single Access
>>> >>>> Token").
>>> >>>>
>>> >>>> Original:
>>> >>>> The client instance is given token management access tokens only
>>> >>>> as part of the manage field of the grant response in Section 3.1.2
>>> >>>> of [GNAP].
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> Yes, the reference was intended to be section 3.2.1 as this defines
>>> the “manage” field that is referenced here.
>>> >>>
>>> >>>>
>>> >>>> 7) <!--[rfced] In the lists in Sections 3.1 and 3.5, we note that
>>> the key
>>> >>>> words (REQUIRED, OPTIONAL, etc.) are included at the end of the
>>> >>>> descriptions whereas the key words are included at the beginning
>>> >>>> of the descriptions in all other relevant sections. Would you
>>> >>>> like to make these consistent by updating Sections 3.1 and 3.5 as
>>> >>>> shown in the example below?
>>> >>>>
>>> >>>> One example
>>> >>>>
>>> >>>> Current:
>>> >>>> token_formats_supported (array of strings):  A list of token formats
>>> >>>>   supported by this AS.  The values in this list MUST be registered
>>> >>>>   in the "GNAP Token Format Registry Formats" registry in Section
>>> 5.3.
>>> >>>>   OPTIONAL.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> token_formats_supported (array of strings):  OPTIONAL. A list of
>>> token
>>> >>>>   formats supported by this AS.  The values in this list MUST be
>>> >>>>   registered in the "GNAP Token Format Registry Formats" registry
>>> per
>>> >>>>   Section 5.3.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> In the companion specification, RFC9646, we seem to have usually put
>>> the keywords at the end on the lists, so I think we should instead update
>>> the lists in sections 3.3 (two lists) and 3.4 (two lists) to make them all
>>> consistent with the normative requirements at the end.
>>> >>>
>>> >>>>
>>> >>>> 8) <!--[rfced] Please note the mismatch here between
>>> >>>> "array of strings" vs. "string".
>>> >>>>
>>> >>>> As both of these seem to be regarding the "GNAP Resource Set
>>> Registration
>>> >>>> Request Parameters" registry (as opposed to the "GNAP RS-Facing
>>> Discovery
>>> >>>> Document Fields" registry), should Section 3.4 be updated to
>>> "string" to match
>>> >>>> the registry?
>>> >>>>
>>> >>>> Section 3.4
>>> >>>> token_formats_supported (array of strings):
>>> >>>>
>>> >>>> vs.
>>> >>>>
>>> >>>> Section 5.6.2:
>>> >>>> token_formats_supported      | string          | Section 3.4
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> Section 5.6.2 should be updated to be “array of strings” and the
>>> corresponding entry in the IANA registry will need to be updated as well
>>> (it currently is registered as “string” at
>>> https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-resource-set-registration-request-parameters
>>> >>>
>>> >>>>
>>> >>>> 9) <!--[rfced] We are having trouble parsing the following text
>>> (are some
>>> >>>> words missing?). Please let us know how we may update this
>>> >>>> sentence for clarity.
>>> >>>>
>>> >>>> Original:
>>> >>>> token_formats_supported (array of strings):  OPTIONAL.  The token
>>> >>>>    formats the RS is able to process for accessing the resource.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> token_formats_supported (array of strings):  OPTIONAL. The list of
>>> >>>>    token formats the RS is able to process in order to access the
>>> >>>>    resources.
>>> >>>> -->
>>> >>>
>>> >>>
>>> >>> We can simplify to:
>>> >>>
>>> >>> token_formats_supported (array of strings):  OPTIONAL. The list of
>>> >>>    token formats that the RS is able to process.
>>> >>>
>>> >>>
>>> >>>>
>>> >>>>
>>> >>>> 10) <!--[rfced] We note "HTTP 400 Bad Request error" vs. "HTTP (Bad
>>> >>>> Request) status code". Should this perhaps be updated as "HTTP
>>> >>>> 400 (Bad Request) error code" for consistency as shown below?
>>> >>>>
>>> >>>> Original:
>>> >>>> If the registration fails, the AS returns an HTTP 400 Bad Request
>>> >>>> error to the RS indicating that the registration was not successful.
>>> >>>>
>>> >>>> In the case of an error from the RS-facing API, the AS responds to
>>> >>>> the RS with an HTTP 400 (Bad Request) status code and a JSON object
>>> >>>> consisting of a single error field, which is either an object or a
>>> >>>> string.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> If the registration fails, the AS returns an HTTP 400 (Bad Request)
>>> >>>> error code to the RS indicating that the registration was not
>>> >>>> successful.
>>> >>>>
>>> >>>> In the case of an error from the RS-facing API, the AS responds to
>>> >>>> the RS with an HTTP 400 (Bad Request) error code and a JSON object
>>> >>>> consisting of a single error field, which is either an object or a
>>> >>>> string.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> From my understanding of the HTTP style guidelines, these instances
>>> should be:
>>> >>>
>>> >>> … returns HTTP status code 400 (Bad Request) to the RS ...
>>> >>>
>>> >>> … the RS with HTTP status code 400 (Bad Request) and a …
>>> >>>
>>> >>>>
>>> >>>> 11) <!--[rfced] FYI, for the sourcecode element in Section 4,
>>> >>>> two spaces were removed from the left side of the access_token
>>> >>>> so that it fits the line-length restriction. Please let us know
>>> >>>> if you prefer otherwise.
>>> >>>>
>>> >>>> This line was previously too long:
>>> >>>>  "existing_access_token": "OS9M2PMHKUR64TB8N6BW7OZB8CDFONP219RP1LT0"
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> I don’t actually see this change in the source or in the rendered
>>> text, but as long as it does not change the relative indentation/formatting
>>> of the JSON element in the HTTP request, that should be fine. We can also
>>> shave a few characters off of the access token value without affecting the
>>> utility of the example. If we do this, we should also change the value in
>>> section 3.3 — even though the examples are not directly connected to each
>>> other, it was intentional that they use a consistent value.
>>> >>>
>>> >>>>
>>> >>>> 12) <!--[rfced] Regarding variations of "string/object"
>>> >>>> in the "GNAP Token Introspection Request" registry.
>>> >>>>
>>> >>>> a) In Table 2 (which corresponds to
>>> >>>>
>>> https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-token-introspection-request
>>> )
>>> >>>> would you like to change this type from
>>> >>>> "object/string" to "string/object" to match the form of the
>>> subsequent item?
>>> >>>> If so, we will ask IANA to update the registry accordingly.
>>> >>>>
>>> >>>> Original:
>>> >>>> resource_server      object/string             Section 3.3 of RFC
>>> xxxx
>>> >>>>
>>> >>>> access               array of strings/objects  Section 3.3 of RFC
>>> xxxx
>>> >>>>
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> resource_server      string/object             Section 3.3 of RFC
>>> 9767
>>> >>>>
>>> >>>> access               array of strings/objects  Section 3.3 of RFC
>>> 9767
>>> >>>
>>> >>> No, this should remain as written, “object/string” and “array of
>>> strings/objects”.
>>> >>>
>>> >>>>
>>> >>>> b) Similarly, in Section 3.3, would you like to change
>>> >>>> "string or object" to "string/object"?
>>> >>>> (Note: If you decide not to change the original "object/string"
>>> above,
>>> >>>> then we will update "string or object" to "object/string" to
>>> >>>> match.)
>>> >>>>
>>> >>>> Original:
>>> >>>> resource_server (string or object):  REQUIRED. ...
>>> >>>>
>>> >>>> access (array of strings/objects):  OPTIONAL. ...
>>> >>>>
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> resource_server (string/object):  REQUIRED. ...
>>> >>>>
>>> >>>> access (array of strings/objects):  OPTIONAL. ...
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> This should be:
>>> >>>
>>> >>> resource_server (object/string): ...
>>> >>>
>>> >>> And the IANA registry should be updated.
>>> >>>
>>> >>>>
>>> >>>> 13) <!--[rfced] Regarding variations of "string/object"
>>> >>>> in the "GNAP Token Introspection Response"
>>> >>>> and "GNAP Resource Set Registration Request Parameters" registries.
>>> >>>>
>>> >>>> a) In Table 3, would you like to change "object/string"
>>> >>>> to "string/object" to match usage in the preceding item?
>>> >>>> If so, we will ask IANA to update the registry (
>>> https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-token-introspection-response)
>>> accordingly.
>>> >>>>
>>> >>>> Original:
>>> >>>> | access      | array of strings/objects | Section 3.3 of RFC xxxx |
>>> >>>> | key         | object/string            | Section 3.3 of RFC xxxx |
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> | access      | array of strings/objects | Section 3.3 of RFC 9767 |
>>> >>>> | key         | string/object            | Section 3.3 of RFC 9767 |
>>> >>>>
>>> >>>>
>>> >>>> b) Similarly, in Section 3.3, would you like to change
>>> "object/string"
>>> >>>> to "string/object" to match usage in the preceding item?
>>> >>>>
>>> >>>> Original:
>>> >>>> key (object/string):  REQUIRED if ...
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> key (string/object):  REQUIRED if ...
>>> >>>>
>>> >>>
>>> >>> No, these should remain “object/string” and “array of
>>> strings/objects” as written.
>>> >>>
>>> >>>>
>>> >>>> c) With the same rationale, in Section 3.4 (and Table 4), would you
>>> like
>>> >>>> to change this as follows? If so, we will ask IANA to update the
>>> registry
>>> >>>> (
>>> https://www.iana.org/assignments/gnap/gnap.xhtml#gnap-resource-set-registration-request-parameters)
>>> accordingly.
>>> >>>>
>>> >>>> Original: resource_server (string or object)
>>> >>>>
>>> >>>> Perhaps:  resource_server (string/object)
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> This should be:
>>> >>>
>>> >>> resource_server (object/string)
>>> >>>
>>> >>>
>>> >>> as above. The IANA registry should be updated accordingly.
>>> >>>
>>> >>>>
>>> >>>> 14) <!--[rfced] May we update this sentence for clarity?
>>> >>>>
>>> >>>> Original:
>>> >>>> The contents of the access token model divulge to the RS information
>>> >>>> about the access token's context and rights.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> The contents of the access token model, which contains information
>>> >>>> about the access token's context and rights, are divulged to the
>>> RS.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> Perhaps instead:
>>> >>>
>>> >>> The contents of the access token model divulge information about the
>>> access token’s context and rights to the RS.
>>> >>>
>>> >>>
>>> >>>>
>>> >>>> 15) <!--[rfced] Would using "certain circumstances" in place of
>>> "limited
>>> >>>> circumstances" be better to avoid the redundancy of "limiting" and
>>> >>>> "limited" as shown below?
>>> >>>>
>>> >>>> Original:
>>> >>>> Furthermore, limiting the use of bearer tokens and AS-provided keys
>>> >>>> to only highly trusted AS's ASs and limited circumstances prevents
>>> the
>>> >>>> attacker from being able to willingly exfiltrate their token to an
>>> >>>> unsuspecting client instance.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> Furthermore, limiting the use of bearer tokens and AS-provided keys
>>> >>>> to only highly trusted ASs and certain circumstances prevents the
>>> >>>> attacker from being able to willingly exfiltrate their token to an
>>> >>>> unsuspecting client instance.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> I think instead we can say:
>>> >>>
>>> >>> Furthermore, limiting the use of bearer tokens and AS-provided keys
>>> >>> to only highly trusted ASs in certain circumstances prevents the
>>> >>> attacker from being able to willingly exfiltrate their token to an
>>> >>> unsuspecting client instance.
>>> >>>
>>> >>>
>>> >>>>
>>> >>>> 16) <!-- [rfced] The URL <https://www.ndss-symposium.org/ndss2014/
>>> >>>> ndss-2014-programme/macaroons-cookies-contextual-caveats-
>>> >>>> decentralized-authorization-cloud/> provides an open-access link
>>> >>>> to this symposium paper and is where the DOI for this paper
>>> >>>> directs. May we replace the original URL with this URL as
>>> >>>> shown below?
>>> >>>>
>>> >>>> Current:
>>> >>>> [MACAROON] Birgisson, A., Politz, J. G., Erlingsson, U., Taly, A.,
>>> >>>>            Vrable, M., and M. Lentczner, "Macaroons: Cookies with
>>> >>>>            Contextual Caveats for Decentralized Authorization in the
>>> >>>>            Cloud", NDSS Symposium 2014, DOI
>>> 10.14722/ndss.2014.23212,
>>> >>>>            February 2014, <https://research.google/pubs/pub41892/>.
>>> >>>>
>>> >>>> Perhaps:
>>> >>>> [MACAROON] Birgisson, A., Politz, J. G., Erlingsson, U., Taly, A.,
>>> >>>>            Vrable, M., and M. Lentczner, "Macaroons: Cookies with
>>> >>>>            Contextual Caveats for Decentralized Authorization in the
>>> >>>>            Cloud", NDSS Symposium 2014, DOI
>>> 10.14722/ndss.2014.23212,
>>> >>>>            February 2014, <https://www.ndss-symposium.org/ndss2014/
>>> >>>>            ndss-2014-programme/macaroons-cookies-contextual-caveats-
>>> >>>>            decentralized-authorization-cloud/>.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> This change is fine - whatever the best URL is for the reference. I
>>> am not able to find another RFC that references the Macaroon format.
>>> >>>
>>> >>>>
>>> >>>> 17) <!-- [rfced] FYI: To match other usage in the document, we
>>> updated the first
>>> >>>> artwork element in Section 3.2 to sourcecode and set the type to
>>> >>>> "http-message". Please let us know if we need to update otherwise.
>>> >>>>
>>> >>>> Additionally, please review the "type" attribute of each sourcecode
>>> element
>>> >>>> in the XML file to ensure correctness. If the current list of
>>> preferred
>>> >>>> values for "type"
>>> >>>> (https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types)
>>> >>>> does not contain an applicable type, then feel free to let us know.
>>> >>>> Also, it is acceptable to leave the "type" attribute not set.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> Yes, these look good.
>>> >>>
>>> >>>>
>>> >>>> 18) <!-- [rfced] Please review usage of <tt> and <em> in this
>>> document
>>> >>>> and let us know if any updates are needed.
>>> >>>>
>>> >>>> In the HTML and PDF outputs, the text enclosed in <tt> is output
>>> >>>> in fixed-width font. In the TXT output, there are no changes to the
>>> font,
>>> >>>> and quotation marks are not generated.
>>> >>>>
>>> >>>> In the HTML and PDF outputs, the text enclosed in <em> is output in
>>> >>>> italics. In the TXT output, the text enclosed in <em> appears with
>>> an
>>> >>>> underscore before and after.  This is used only in Section 2.1.1.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> Yes, these look good.
>>> >>>
>>> >>>>
>>> >>>> 19) <!-- [rfced] Please review the "Inclusive Language" portion of
>>> the online
>>> >>>> Style Guide <
>>> https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
>>> >>>> and let us know if any changes are needed.  Updates of this nature
>>> typically
>>> >>>> result in more precise language, which is helpful for readers.
>>> >>>>
>>> >>>> Note that our script did not flag any words in particular, but this
>>> should
>>> >>>> still be reviewed as a best practice.
>>> >>>> -->
>>> >>>>
>>> >>>
>>> >>> I believe we have followed best practice for this language.
>>> >>>
>>> >>>>
>>> >>>> Thank you.
>>> >>>>
>>> >>>> RFC Editor/kc/ar
>>> >>>>
>>> >>>
>>> >>>
>>> >>> I believe with these changes implemented we should be ready to
>>> publish.
>>> >>>
>>> >>> — Justin
>>> >>>
>>> >>>>
>>> >>>> On Apr 10, 2025, rfc-edi...@rfc-editor.org wrote:
>>> >>>>
>>> >>>> *****IMPORTANT*****
>>> >>>>
>>> >>>> Updated 2025/04/10
>>> >>>>
>>> >>>> RFC Author(s):
>>> >>>> --------------
>>> >>>>
>>> >>>> Instructions for Completing AUTH48
>>> >>>>
>>> >>>> Your document has now entered AUTH48.  Once it has been reviewed
>>> and
>>> >>>> approved by you and all coauthors, it will be published as an RFC.
>>> >>>> If an author is no longer available, there are several remedies
>>> >>>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
>>> >>>>
>>> >>>> You and you coauthors are responsible for engaging other parties
>>> >>>> (e.g., Contributors or Working Group) as necessary before providing
>>> >>>> your approval.
>>> >>>>
>>> >>>> Planning your review
>>> >>>> ---------------------
>>> >>>>
>>> >>>> Please review the following aspects of your document:
>>> >>>>
>>> >>>> *  RFC Editor questions
>>> >>>>
>>> >>>> Please review and resolve any questions raised by the RFC Editor
>>> >>>> that have been included in the XML file as comments marked as
>>> >>>> follows:
>>> >>>>
>>> >>>> <!-- [rfced] ... -->
>>> >>>>
>>> >>>> These questions will also be sent in a subsequent email.
>>> >>>>
>>> >>>> *  Changes submitted by coauthors
>>> >>>>
>>> >>>> Please ensure that you review any changes submitted by your
>>> >>>> coauthors.  We assume that if you do not speak up that you
>>> >>>> agree to changes submitted by your coauthors.
>>> >>>>
>>> >>>> *  Content
>>> >>>>
>>> >>>> Please review the full content of the document, as this cannot
>>> >>>> change once the RFC is published.  Please pay particular attention
>>> to:
>>> >>>> - IANA considerations updates (if applicable)
>>> >>>> - contact information
>>> >>>> - references
>>> >>>>
>>> >>>> *  Copyright notices and legends
>>> >>>>
>>> >>>> Please review the copyright notice and legends as defined in
>>> >>>> RFC 5378 and the Trust Legal Provisions
>>> >>>> (TLP – https://trustee.ietf.org/license-info).
>>> >>>>
>>> >>>> *  Semantic markup
>>> >>>>
>>> >>>> Please review the markup in the XML file to ensure that elements
>>> of
>>> >>>> content are correctly tagged.  For example, ensure that
>>> <sourcecode>
>>> >>>> and <artwork> are set correctly.  See details at
>>> >>>> <https://authors.ietf.org/rfcxml-vocabulary>.
>>> >>>>
>>> >>>> *  Formatted output
>>> >>>>
>>> >>>> Please review the PDF, HTML, and TXT files to ensure that the
>>> >>>> formatted output, as generated from the markup in the XML file, is
>>> >>>> reasonable.  Please note that the TXT will have formatting
>>> >>>> limitations compared to the PDF and HTML.
>>> >>>>
>>> >>>>
>>> >>>> Submitting changes
>>> >>>> ------------------
>>> >>>>
>>> >>>> To submit changes, please reply to this email using ‘REPLY ALL’ as
>>> all
>>> >>>> the parties CCed on this message need to see your changes. The
>>> parties
>>> >>>> include:
>>> >>>>
>>> >>>> *  your coauthors
>>> >>>>
>>> >>>> *  rfc-edi...@rfc-editor.org (the RPC team)
>>> >>>>
>>> >>>> *  other document participants, depending on the stream (e.g.,
>>> >>>>   IETF Stream participants are your working group chairs, the
>>> >>>>   responsible ADs, and the document shepherd).
>>> >>>>
>>> >>>> *  auth48archive@rfc-editor.org, which is a new archival mailing
>>> list
>>> >>>>   to preserve AUTH48 conversations; it is not an active discussion
>>> >>>>   list:
>>> >>>>
>>> >>>>  *  More info:
>>> >>>>
>>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>>> >>>>
>>> >>>>  *  The archive itself:
>>> >>>>     https://mailarchive.ietf.org/arch/browse/auth48archive/
>>> >>>>
>>> >>>>  *  Note: If only absolutely necessary, you may temporarily opt out
>>> >>>>     of the archiving of messages (e.g., to discuss a sensitive
>>> matter).
>>> >>>>     If needed, please add a note at the top of the message that you
>>> >>>>     have dropped the address. When the discussion is concluded,
>>> >>>>     auth48archive@rfc-editor.org will be re-added to the CC list
>>> and
>>> >>>>     its addition will be noted at the top of the message.
>>> >>>>
>>> >>>> You may submit your changes in one of two ways:
>>> >>>>
>>> >>>> An update to the provided XML file
>>> >>>> — OR —
>>> >>>> An explicit list of changes in this format
>>> >>>>
>>> >>>> Section # (or indicate Global)
>>> >>>>
>>> >>>> OLD:
>>> >>>> old text
>>> >>>>
>>> >>>> NEW:
>>> >>>> new text
>>> >>>>
>>> >>>> You do not need to reply with both an updated XML file and an
>>> explicit
>>> >>>> list of changes, as either form is sufficient.
>>> >>>>
>>> >>>> We will ask a stream manager to review and approve any changes that
>>> seem
>>> >>>> beyond editorial in nature, e.g., addition of new text, deletion of
>>> text,
>>> >>>> and technical changes.  Information about stream managers can be
>>> found in
>>> >>>> the FAQ.  Editorial changes do not require approval from a stream
>>> manager.
>>> >>>>
>>> >>>>
>>> >>>> Approving for publication
>>> >>>> --------------------------
>>> >>>>
>>> >>>> To approve your RFC for publication, please reply to this email
>>> stating
>>> >>>> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
>>> >>>> as all the parties CCed on this message need to see your approval.
>>> >>>>
>>> >>>>
>>> >>>> Files
>>> >>>> -----
>>> >>>>
>>> >>>> The files are available here:
>>> >>>> https://www.rfc-editor.org/authors/rfc9767.xml
>>> >>>> https://www.rfc-editor.org/authors/rfc9767.html
>>> >>>> https://www.rfc-editor.org/authors/rfc9767.pdf
>>> >>>> https://www.rfc-editor.org/authors/rfc9767.txt
>>> >>>>
>>> >>>> Diff file of the text:
>>> >>>> https://www.rfc-editor.org/authors/rfc9767-diff.html
>>> >>>> https://www.rfc-editor.org/authors/rfc9767-rfcdiff.html (side by
>>> side)
>>> >>>>
>>> >>>> Diff of the XML:
>>> >>>> https://www.rfc-editor.org/authors/rfc9767-xmldiff1.html
>>> >>>>
>>> >>>>
>>> >>>> Tracking progress
>>> >>>> -----------------
>>> >>>>
>>> >>>> The details of the AUTH48 status of your document are here:
>>> >>>> https://www.rfc-editor.org/auth48/rfc9767
>>> >>>>
>>> >>>> Please let us know if you have any questions.
>>> >>>>
>>> >>>> Thank you for your cooperation,
>>> >>>>
>>> >>>> RFC Editor
>>> >>>>
>>> >>>> --------------------------------------
>>> >>>> RFC9767 (draft-ietf-gnap-resource-servers-09)
>>> >>>>
>>> >>>> Title            : Grant Negotiation and Authorization Protocol
>>> Resource Server Connections
>>> >>>> Author(s)        : J. Richer, Ed., F. Imbault
>>> >>>> WG Chair(s)      : Yaron Sheffer, Leif Johansson
>>> >>>> Area Director(s) : Deb Cooley, Paul Wouters
>>> >>>
>>> >>> --
>>> >>> auth48archive mailing list -- auth48archive@rfc-editor.org
>>> >>> To unsubscribe send an email to auth48archive-le...@rfc-editor.org
>>> >>
>>> >
>>>
>>>
>
-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to