<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-client-id-metadata-document-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="Client ID Document">OAuth Client ID Metadata Document</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-client-id-metadata-document-00"/>
    <author fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
        <uri>https://aaronparecki.com</uri>
      </address>
    </author>
    <author fullname="Emelia Smith">
      <organization/>
      <address>
        <email>emelia@brandedcode.com</email>
        <uri>https://thisismissem.social</uri>
      </address>
    </author>
    <date year="2025" month="October" day="08"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>oauth</keyword>
    <abstract>
      <?line 97?>

<t>This specification defines a mechanism through which an OAuth client can
identify itself to authorization servers, without prior dynamic client
registration or other existing registration. This is through the usage of a URL
as a <tt>client_id</tt> in an OAuth flow, where the URL refers to a document containing
the necessary client metadata, enabling the authorization server to fetch the
metadata about the client as needed.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drafts.oauth.net/draft-ietf-oauth-client-id-metadata-document/draft-ietf-oauth-client-id-metadata-document.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-client-id-metadata-document/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-client-id-metadata-document"/>.</t>
    </note>
  </front>
  <middle>
    <?line 106?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In order for an OAuth 2.0 <xref target="RFC6749"/> client to utilize an OAuth 2.0
authorization server, the client needs to establish a unique identifier, and
needs to to provide the server with metadata about the application, such as the
application name, icon and redirect URIs. In cases where a client is interacting
with authorization servers that it has no relationship with, manual registration
is impossible.</t>
      <t>While Dynamic Client Registration <xref target="RFC7591"/> can provide a method for a
previously unknown client to establish itself at an authorization server and
obtain a client identifier, this is not always practical in some deployments and
can create additional challenges around management of the registration data and
cleanup of inactive clients.</t>
      <t>This specification describes how an OAuth 2.0 client can publish its
own registration information and avoid the need for pre-registering
at each authorization server.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="client-identifier">
      <name>Client Identifier</name>
      <t>This specification defines the client identifier as a URL with the following
restrictions. Client identifier URLs <bcp14>MUST</bcp14> have an "https" scheme, <bcp14>MUST</bcp14> contain a
path component, <bcp14>MUST NOT</bcp14> contain single-dot or double-dot path segments, <bcp14>MUST
NOT</bcp14> contain a fragment component and <bcp14>MUST NOT</bcp14> contain a username or password
Client identifier URLs <bcp14>SHOULD NOT</bcp14> include a query string component, and <bcp14>MAY</bcp14> contain a port.</t>
      <t>This specification places no restrictions on what URL is used as
a client identifier. A short URL is <bcp14>RECOMMENDED</bcp14>, since the URL may
be displayed to the end user in the authorization interface or in
management interfaces. Usage of a stable URL that does not frequently
change for the client is also <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="client-information-discovery">
      <name>Client Information Discovery</name>
      <t>One purpose of registering clients at the authorization server is so that
the authorization server has additional information about the client that
can be used during an OAuth flow, such as presenting information about
the client to the user in an authorization consent screen, for example the
client name and logo.</t>
      <t>The authorization server <bcp14>SHOULD</bcp14> fetch the document indicated by the <tt>client_id</tt>
to retrieve the client registration information.</t>
      <section anchor="client-metadata">
        <name>Client Metadata</name>
        <t>The client metadata document URL is a JSON document containing the metadata
of the client. The client metadata values are the values defined in
the OAuth Dynamic Client Registration Metadata OAuth Parameters registry
<eref target="https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#client-metadata">https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#client-metadata</eref>.</t>
        <t>The client metadata document <bcp14>MUST</bcp14> contain a <tt>client_id</tt> property whose value
<bcp14>MUST</bcp14> match the URL of the document using simple string comparison as
defined in <xref target="RFC3986"/> Section 6.2.1.</t>
        <t>The client metadata document <bcp14>MAY</bcp14> define additional properties in the response.
The client metadata document <bcp14>MAY</bcp14> also be served with more specific content types
as long as the response is JSON and conforms to <tt>application/&lt;AS-defined&gt;+json</tt>.</t>
        <t>As there is no way to establish a shared secret to be used with client metadata
documents, the following restrictions apply on the contents of the
client metadata document:</t>
        <ul spacing="normal">
          <li>
            <t>the <tt>token_endpoint_auth_method</tt> property <bcp14>MUST NOT</bcp14> include <tt>client_secret_post</tt>,
<tt>client_secret_basic</tt>, <tt>client_secret_jwt</tt>, or any other method based around
a shared symmetric secret.</t>
          </li>
          <li>
            <t>the <tt>client_secret</tt> and <tt>client_secret_expires_at</tt> properties <bcp14>MUST NOT</bcp14> be used</t>
          </li>
        </ul>
        <t>See <xref target="client_authentication"/> for more details.</t>
        <t>Other specifications <bcp14>MAY</bcp14> place additional restrictions on the contents of the
client metadata document accepted by authorization servers implementing their
specification, for instance, preventing the registration of confidential clients
by requiring the <tt>token_endpoint_auth_method</tt> property be set to <tt>"none"</tt>.</t>
        <t>TBD: We may want a property such as <tt>client_id_expires_at</tt> for indicating that the client is ephemeral and not valid after a given timestamp, especially for documents issued by a service for development purposes.</t>
      </section>
      <section anchor="documents_for_development">
        <name>Client Metadata Documents for Development Purposes</name>
        <t>An authorization server may have restrictions on what it accepts as valid <tt>redirect_uris</tt>, for instance, limiting them to the same-origin as the <tt>client_id</tt> or <tt>client_uri</tt> properties. However, if an authorization server does place additional restrictions on the accepted <tt>redirect_uris</tt> then it <bcp14>SHOULD</bcp14> provide at least one Client ID Metadata Document Service (described below) which is exempt from these restrictions.</t>
        <t>When developing applications against an authorization server which uses this specification, developers often encounter the issue of "how do I serve a Client ID Metadata Document at a publicly accessible https URL whilst developing my application on my localhost?".</t>
        <t>To enable developers to author applications on their machines, without exposing their machines to the public internet, the usage of Client ID Metadata Document Services by the authorization server is <bcp14>RECOMMENDED</bcp14>.</t>
        <t>A Client ID Metadata Document Service is a web service through which developers can acquire a stable URL to a Client ID Metadata Document. This service <bcp14>MAY</bcp14> expire clients from time to time, and <bcp14>MAY</bcp14> require developers to provide additional information about the client being developed.</t>
        <t>By providing at least one Client ID Metadata Document Service, an authorization server can enable developers to create applications, and still indicate to non-technical people that the client that they are about to authorize is currently under-development and may not be trustworthy or secure.</t>
      </section>
      <section anchor="metadata-discovery-errors">
        <name>Metadata Discovery Errors</name>
        <t>If fetching the metadata document fails, the authorization server <bcp14>SHOULD</bcp14> abort the
authorization request.</t>
      </section>
      <section anchor="metadata-caching">
        <name>Metadata Caching</name>
        <t>The authorization server <bcp14>MAY</bcp14> cache the client metadata it discovers at the
client metadata document URL.</t>
        <t>The authorization server <bcp14>SHOULD</bcp14> respect HTTP cache headers <xref target="RFC9111"/> when caching client metadata,
but <bcp14>MAY</bcp14> define its own upper and/or lower bounds on an acceptable cache lifetime as well.</t>
        <t>The authorization server <bcp14>MUST NOT</bcp14> cache error responses. The authorization
server also <bcp14>MUST NOT</bcp14> cache documents which are invalid or malformed.</t>
      </section>
      <section anchor="redirect-url-registration">
        <name>Redirect URL Registration</name>
        <t>According to <xref target="RFC9700"/>, the authorization server
<bcp14>MUST</bcp14> require registration of redirect URIs, and <bcp14>MUST</bcp14> ensure that the redirect URI
in a request is an exact match of a registered redirect URI.</t>
        <t>This method of client information discovery establishes a
registered redirect URI with the authorization server which is used when
comparing the redirect URI in an authorization request against the registered
redirect URIs.</t>
      </section>
    </section>
    <section anchor="as-metadata">
      <name>Authorization Server Metadata</name>
      <t>Authorization servers that publish Authorization Server Metadata <xref target="RFC8414"/> <bcp14>MUST</bcp14> include the following property to signal support for client metadata documents as described in this specification.</t>
      <dl>
        <dt><tt>client_id_metadata_document_supported</tt>:</dt>
        <dd>
          <t><bcp14>OPTIONAL</bcp14>. Boolean value specifying whether the authorization server supports retrieving client metadata from a <tt>client_id</tt> URL as described in this specification.</t>
        </dd>
      </dl>
      <t>This enables clients to avoid sending the user to a dead end, by only redirecting the user to an authorization server that supports this specification. Otherwise, the client would redirect the user and the user would be met with an error about an invalid client as described by Section 4.1.2.1 of <xref target="RFC6749"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>In addition to the security considerations in OAuth 2.0 Core <xref target="RFC6749"/>, and OAuth 2.0 Threat Model and Security Considerations <xref target="RFC6819"/>, and <xref target="RFC9700"/> the additional considerations apply.</t>
      <section anchor="redirect_uri_relationship">
        <name>Relationship between <tt>redirect_uris</tt> and <tt>client_id</tt> or <tt>client_uri</tt></name>
        <t>An authorization server <bcp14>MAY</bcp14> impose restrictions or relationships between the <tt>redirect_uris</tt> and the <tt>client_id</tt> or <tt>client_uri</tt> properties, for example to restrict the <tt>redirect_uri</tt> to the same-origin as the Client ID Metadata Document. Without restrictions like these, there are potential trust and safety issues where the client attempts to impersonate a more well-known client or otherwise act in a way which is malicious or puts the end-user at risk.</t>
        <t>Having no restrictions on the relationship between <tt>redirect_uris</tt> and <tt>client_id</tt> or <tt>client_uri</tt> was a common practice with <xref target="Solid-OIDC"/>'s Client ID Documents, so this ability is preserved for backwards compatibility between <xref target="Solid-OIDC"/> and this specification.</t>
        <t>Some restrictions on <tt>redirect_uris</tt> can make developer usage of Client ID Metadata Documents difficult. The section <xref target="documents_for_development"/> contains recommendations for enabling development usage of Client ID Metadata Documents for authorization servers that impose restrictions on the <tt>redirect_uri</tt>.</t>
      </section>
      <section anchor="client_authentication">
        <name>Client Authentication</name>
        <t>Since the client establishes its own registration data at the authorization server,
prior coordination of client credentials is not possible. However, clients <bcp14>MAY</bcp14> establish
credentials at the authorization server by using authentication methods that use
public/private key pairs, by publishing the public key in their metadata document.</t>
        <t>For example, the client <bcp14>MAY</bcp14> include the following properties in its metadata document
to establish a public key and advertise the <tt>private_key_jwt</tt> authentication method defined in <xref target="OpenID"/>:</t>
        <artwork><![CDATA[
{
  ...
  "token_endpoint_auth_method": "private_key_jwt",
  "jwks_uri": "https://client.example.com/jwks.json"
  ...
}
]]></artwork>
        <t>This establishes this client as a confidential client, and any communication with
the authorization server <bcp14>MUST</bcp14> include client authentication of the registered type.</t>
        <t>The particular method of how the client manages the private key is out of scope of this specification, but may include manual provisioning or methods such as Attestation Based Client Authentication <xref target="I-D.draft-ietf-oauth-attestation-based-client-auth"/>. For example, the client developer could run a Client Attester Backend, using a native application's platform-specific APIs to authenticate to the backend service, where the private key corresponding to the <tt>jwks_uri</tt> key is managed by the backend service. This would allow a mobile app to request JWTs from the backend service that the mobile app could then use as client authentication to the authorization server.</t>
      </section>
      <section anchor="changes-in-client-keys">
        <name>Changes in Client Keys</name>
        <t>If the authorization server notices that the <tt>jwks_uri</tt> or the contents at the <tt>jwks_uri</tt> have changed compared to the last time it fetched the metadata, the authorization server <bcp14>MAY</bcp14> take actions such as revoking any tokens issued to this client, or revoking the user's consent for this client. The particular actions to take are left up to the discretion of the authorization server based on its own risk assessment.</t>
      </section>
      <section anchor="oauth-phishing-attacks">
        <name>OAuth Phishing Attacks</name>
        <t>Authorization servers <bcp14>SHOULD</bcp14> fetch the <tt>client_id</tt> metadata document provided in the authorization request in order to provide users with additional information about the request, such as the application name and logo. If the server does not fetch the client metadata document, then it <bcp14>SHOULD</bcp14> take additional measures to ensure the user is provided with as much information as possible about the request.</t>
        <t>The authorization server <bcp14>SHOULD</bcp14> display the hostname of the <tt>client_id</tt> on the authorization interface, in addition to displaying the fetched client information if any. Displaying the hostname helps users know that they are authorizing the expected application.</t>
        <t>If fetching the client metadata document fails for any reason, the <tt>client_id</tt> URL is the only piece of information the user has as an indication of which application they are authorizing.</t>
      </section>
      <section anchor="server-side-request-forgery-ssrf-attacks">
        <name>Server Side Request Forgery (SSRF) Attacks</name>
        <t>Authorization servers fetching the client metadata document and resolving URLs located in the metadata document should be aware of possible SSRF attacks. Authorization servers <bcp14>SHOULD</bcp14> avoid fetching any URLs using private or loopback addresses and consider network policies or other measures to prevent making requests to these addresses. Authorization servers <bcp14>SHOULD</bcp14> also be aware of the possibility that URLs might be non-http-based URI schemes which can lead to other possible SSRF attack vectors.</t>
      </section>
      <section anchor="maximum-response-size-for-client-metadata-documents">
        <name>Maximum Response Size for Client Metadata Documents</name>
        <t>Authorization servers <bcp14>SHOULD</bcp14> limit the response size when fetching the client metadata document, as to avoid denial of service attacks against the authorization server by consuming excessive resources (memory, disk, database). The recommended maximum response size for client metadata documents is 5 kilobytes.</t>
      </section>
      <section anchor="displaying-logos-to-end-users">
        <name>Displaying Logos to End-Users</name>
        <t>Authorization servers that wish to make use of the <tt>logo_uri</tt> property within client metadata document <bcp14>SHOULD</bcp14> prefetch the file at <tt>logo_uri</tt> and cache it for the cache duration of the client metadata document. This allows for moderation tools to verify the file contents (e.g., preventing usage of logos that look like other logos), as well as preventing the logo from being dynamically changed to confuse an end-user.</t>
        <t>Caching of the <tt>logo_uri</tt> response can additionally prevent cross-domain tracking through the <tt>logo_uri</tt> being requested by the client, since the cached file would be served not from the remote URI but instead from a URI that the Authorization server trusts.</t>
      </section>
      <section anchor="client-id-domain-trust">
        <name>Client ID Domain Trust</name>
        <t>The authorization server <bcp14>MAY</bcp14> choose to have its own heuristics and policies around the trust of domain names used as client IDs.</t>
        <t>For example, the authorization server could require that the first 100 users to authorize a <tt>client_id</tt> see an additional warning screen before the OAuth consent screen. The authorization server could check attributes of the domain reputation, such as how recently the domain was registered, and put up extra warnings for new domains.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-authorization-server-metadata-registry">
        <name>OAuth Authorization Server Metadata Registry</name>
        <t>The following authorization server metadata value is defined by this specification and registered in the IANA "OAuth Authorization Server Metadata" registry established in OAuth 2.0 Authorization Server Metadata <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: <tt>client_id_metadata_document_supported</tt>:</t>
          </li>
          <li>
            <t>Metadata Description: JSON boolean value specifying whether the authorization server supports retrieving client metadata from a <tt>client_id</tt> URL.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document: <xref target="as-metadata"/> of [draft-ietf-oauth-client-id-metadata-document-00]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6819">
          <front>
            <title>OAuth 2.0 Threat Model and Security Considerations</title>
            <author fullname="T. Lodderstedt" initials="T." role="editor" surname="Lodderstedt"/>
            <author fullname="M. McGloin" initials="M." surname="McGloin"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document gives additional security considerations for OAuth, beyond those in the OAuth 2.0 specification, based on a comprehensive threat model for the OAuth 2.0 protocol. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6819"/>
          <seriesInfo name="DOI" value="10.17487/RFC6819"/>
        </reference>
        <reference anchor="RFC7591">
          <front>
            <title>OAuth 2.0 Dynamic Client Registration Protocol</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Machulak" initials="M." surname="Machulak"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This specification defines mechanisms for dynamically registering OAuth 2.0 clients with authorization servers. Registration requests send a set of desired client metadata values to the authorization server. The resulting registration responses return a client identifier to use at the authorization server and the client metadata values registered for the client. The client can then use this registration information to communicate with the authorization server using the OAuth 2.0 protocol. This specification also defines a set of common client metadata fields and values for clients to use during registration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7591"/>
          <seriesInfo name="DOI" value="10.17487/RFC7591"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC9700">
          <front>
            <title>Best Current Practice for OAuth 2.0 Security</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="A. Labunets" initials="A." surname="Labunets"/>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <date month="January" year="2025"/>
            <abstract>
              <t>This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in RFCs 6749, 6750, and 6819 to incorporate practical experiences gathered since OAuth 2.0 was published and covers new threats relevant due to the broader application of OAuth 2.0. Further, it deprecates some modes of operation that are deemed less secure or even insecure.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="240"/>
          <seriesInfo name="RFC" value="9700"/>
          <seriesInfo name="DOI" value="10.17487/RFC9700"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="IndieAuth" target="https://indieauth.spec.indieweb.org/">
          <front>
            <title>IndieAuth</title>
            <author initials="A." surname="Parecki" fullname="Aaron Parecki">
              <organization/>
            </author>
            <date year="2022" month="February" day="12"/>
          </front>
        </reference>
        <reference anchor="Solid-OIDC" target="https://solidproject.org/TR/2022/oidc-20220328">
          <front>
            <title>Solid-OIDC</title>
            <author initials="A." surname="Coburn" fullname="Aaron Coburn">
              <organization>Inrupt</organization>
            </author>
            <author initials="" surname="elf Pavlik" fullname="elf Pavlik">
              <organization/>
            </author>
            <author initials="D." surname="Zagidulin" fullname="Dmitri Zagidulin">
              <organization/>
            </author>
            <date year="2022" month="March" day="28"/>
          </front>
        </reference>
        <reference anchor="OpenID" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID Connect Core 1.0</title>
            <author initials="N." surname="Sakimura" fullname="N. Sakimura">
              <organization>NAT.Consulting</organization>
            </author>
            <author initials="J." surname="Bradley" fullname="J. Bradley">
              <organization>Yubico</organization>
            </author>
            <author initials="M." surname="Jones" fullname="M. Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author initials="B. de" surname="Medeiros" fullname="B. de Medeiros">
              <organization>Google</organization>
            </author>
            <author initials="C." surname="Mortimore" fullname="C. Mortimore">
              <organization>Disney</organization>
            </author>
            <date year="2023" month="December" day="15"/>
          </front>
        </reference>
        <reference anchor="OpenID.Federation" target="https://openid.net/specs/openid-federation-1_0.html">
          <front>
            <title>OpenID Federation 1.0</title>
            <author initials="R." surname="Hedberg" fullname="R. Hedberg">
              <organization>independent</organization>
            </author>
            <author initials="M.B." surname="Jones" fullname="M.B. Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author initials="A.Å." surname="Solberg" fullname="A.Å. Solberg">
              <organization>Sikt</organization>
            </author>
            <author initials="J." surname="Bradley" fullname="J. Bradley">
              <organization>Yubico</organization>
            </author>
            <author initials="G. D." surname="Marco" fullname="G. De Marco">
              <organization>independent</organization>
            </author>
            <author initials="V." surname="Dzhuvinov" fullname="V. Dzhuvinov">
              <organization>Connect2id</organization>
            </author>
            <date year="2024" month="May" day="17"/>
          </front>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-attestation-based-client-auth">
          <front>
            <title>OAuth 2.0 Attestation-Based Client Authentication</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
              <organization>Bundesdruckerei</organization>
            </author>
            <author fullname="Christian Bormann" initials="C." surname="Bormann">
              <organization>SPRIND</organization>
            </author>
            <date day="15" month="September" year="2025"/>
            <abstract>
              <t>   This specification defines an extension to the OAuth 2 protocol as
   defined in [RFC6749] which enables a Client Instance to include a
   key-bound attestation in interactions with an Authorization Server or
   a Resource Server.  This new method enables Client Instances involved
   in a client deployment that is traditionally viewed as a public
   client, to be able to utilize this key-bound attestation to
   authenticate.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-attestation-based-client-auth-07"/>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC9111">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
      </references>
    </references>
    <?line 343?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The idea of using URIs as the <tt>client_id</tt> in OAuth based authorization requests is not new, and has previously been specified in varying ways by <xref target="IndieAuth"/>, <xref target="Solid-OIDC"/>, and <xref target="OpenID.Federation"/>. This specification is largely inspired by the work of Aaron Coburn, elf Pavlik, and Dmitri Zagidulin in their <xref target="Solid-OIDC"/> specification which defined dereferenceable Client Identifier Documents.</t>
      <t>The authors would like to thank the following people for their contributions and reviews of this specification: Brian Campbell, Dick Hardt, Leif Johansson, Pieter Kasselman, Bryan Newbold, Matthieu Sieben, and Filip Skokan.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>(This appendix to be deleted by the RFC editor in the final specification.)</t>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
