Skip to content

Commit a23dd51

Browse files
committed
add note on CWT encoding
1 parent 410e142 commit a23dd51

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

draft-ietf-oauth-status-list.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -787,6 +787,8 @@ The HTTP response SHOULD use gzip Content-Encoding as defined in {{RFC9110}}.
787787

788788
If caching-related HTTP headers are present in the HTTP response, Relying Parties MUST prioritize the exp and ttl claims within the Status List Token over the HTTP headers for determining caching behavior.
789789

790+
Note that while the examples for the Status List Token in CWT format in this document are given in hex encoding, this is only done to be able to provide examples. The expected encoding in a response containing a Status List Token in CWT format is binary encoding as defined in section 9.2.1 of {{RFC8392}}. That means that the body of the HTTP response contains the raw CBOR bytes.
791+
790792
## Validation Rules
791793

792794
Upon receiving a Referenced Token, a Relying Party MUST first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature and expiration time. The processing rules for Referenced Tokens (such as JWT or CWT) MUST precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired. As this is out of scope for this document, this validation is not described here, but is expected to be done according to the format of the Referenced Token.
@@ -1908,6 +1910,7 @@ CBOR encoding:
19081910

19091911
-13
19101912

1913+
* add a note that cwt is encoded in raw/binary.
19111914
* added further privacy consideration around issuer tracking using unique URIs
19121915

19131916
-12

0 commit comments

Comments
 (0)