Events without label "editorial"

Issues
------
* oauth-wg/oauth-sd-jwt-vc (+1/-0/💬6)
 1 issues created:
 - Should `sd` `allowed` used by issuers? (by babisRoutis)
https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/323
 5 issues received 6 new comments:
 - #321 Be more opinionated about validity claims? (1 by danielfett)
https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/321 [pending close] - #319 Mapping for 'termsOfUse' from VCDM (2 by danielfett, tweeddalex) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/319 [pending close] - #315 Recommend against using the x5u parameter in JWK (1 by danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/315 - #310 Should `mandatory` be added to claim metadata? (1 by danielfett) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/310 [enhancement] [discuss] - #253 Issuer-signed JWT Verification Key Validation - Separation of signature and identity verification/validation? (1 by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/issues/253 [discuss]
* oauth-wg/oauth-cross-device-security (+0/-5/💬3)
 3 issues received 3 new comments:
 - #169 broken internal links (1 by PieterKas)
https://github.com/oauth-wg/oauth-cross-device-security/issues/169 - #166 Make Authorisation Server role explicit in establishing Proximity (1 by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/issues/166 - #164 Editorial Updates (1 by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/issues/164
 5 issues closed:
- Add acknowledgement for Dan Moore's contribution https://github.com/oauth-wg/oauth-cross-device-security/issues/168 - Make Authorisation Server role explicit in establishing Proximity https://github.com/oauth-wg/oauth-cross-device-security/issues/166 - Additional Info about shared network https://github.com/oauth-wg/oauth-cross-device-security/issues/165 - Editorial Updates https://github.com/oauth-wg/oauth-cross-device-security/issues/164 - broken internal links https://github.com/oauth-wg/oauth-cross-device-security/issues/169
* oauth-wg/oauth-selective-disclosure-jwt (+0/-2/💬1)
 1 issues received 1 new comments:
 - #574 Providing interoperability for ECDH-HMAC signatures on key binding JWT 
(1 by bc-pi)
https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/574 [help wanted] [question] [pending-close]
 2 issues closed:
- Providing interoperability for ECDH-HMAC signatures on key binding JWT https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/574 [help wanted] [question] [pending-close] - Issuer/Verifier unlinkability with an honest Verifier can be broken if certain JWS headers are used https://github.com/oauth-wg/oauth-selective-disclosure-jwt/issues/581
* oauth-wg/oauth-v2-1 (+1/-0/💬0)
 1 issues created:
 - clarity on refresh_token grant with lesser scope change without 
"offline_access" (by dvanmali)
https://github.com/oauth-wg/oauth-v2-1/issues/216
* oauth-wg/draft-ietf-oauth-status-list (+1/-3/💬0)
 1 issues created:
 - property uri (by adeinega)
https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/298
 3 issues closed:
- More Feedback from Denis https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/294 - Extended Key Usage OID https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/283 - Feedback regarding expected format https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/292
* oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+3/-12/💬8)
 3 issues created:
 - pop iat should now be required (by panva)
https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/133 - Dedicated error code for missing client attestation (by mickrau) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/131 - Allow MAC as signature algorithms? (by paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/130
 2 issues received 8 new comments:
 - #131 Dedicated error code for missing client attestation (6 by mickrau, 
panva, paulbastian)
https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/131 - #81 client_id optional in the request body (2 by tplooker) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/81 [has-pr]
 12 issues closed:
- Create section on Processing and Verification https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/122 [has-pr] - client_id optional in the request body https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/81 [has-pr] - Editorial - what is a "traditional OAuth2 ecosystem" https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/117 [has-pr] - Remove `exp` from the PoP https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/124 [has-pr] - Add Authorization Server policy section about "Reuse of a Client Attestation JWT" https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/109 [has-pr] - "transaction" is easily misunderstood https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/116 [has-pr] - Client MUST support nonce fetching https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/103 [has-pr] - Support returning nonce in any responses, similar to DPoP https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/101 [has-pr] - Potential problems with HTTP OPTIONS? https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/102 [has-pr] - Nonce is meant for freshness, not to guarantee one-time use https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/104 [has-pr] - Evolution of the nonce fetching https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/110 [has-pr] - Add relevant oauth error responses to token requests when the client attestation is invalid https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/73 [has-pr]


Pull requests
-------------
* oauth-wg/oauth-identity-chaining (+1/-0/💬0)
 1 pull requests submitted:
 - Use IANA.media-types so the tooling can find the media types registry 
without an explicit target (by bc-pi)
https://github.com/oauth-wg/oauth-identity-chaining/pull/167
* oauth-wg/oauth-sd-jwt-vc (+2/-1/💬1)
 2 pull requests submitted:
 - Fixes 317 (by babisRoutis)
https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/324 - -11 (by bc-pi) https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/322
 1 pull requests received 1 new comments:
 - #324 Fixes 317 (1 by bc-pi)
https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/324
 1 pull requests merged:
 - -11
https://github.com/oauth-wg/oauth-sd-jwt-vc/pull/322
* oauth-wg/oauth-cross-device-security (+6/-5/💬0)
 6 pull requests submitted:
 - Add Dan Moore to acknowledgement (by PieterKas)
https://github.com/oauth-wg/oauth-cross-device-security/pull/175 - Authorization Server only mitigations (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/174 - Clarify authorization server role in establishing proximity (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/173 - Devices not sharing a network (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/172 - Editorial Updates - Issue 164 (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/171 - Fixing Labels (by PieterKas) https://github.com/oauth-wg/oauth-cross-device-security/pull/170
 5 pull requests merged:
 - Add Dan Moore to acknowledgement
https://github.com/oauth-wg/oauth-cross-device-security/pull/175 - Clarify authorization server role in establishing proximity https://github.com/oauth-wg/oauth-cross-device-security/pull/173 - Devices not sharing a network https://github.com/oauth-wg/oauth-cross-device-security/pull/172 - Editorial Updates - Issue 164 https://github.com/oauth-wg/oauth-cross-device-security/pull/171 - Fixing Labels https://github.com/oauth-wg/oauth-cross-device-security/pull/170
* oauth-wg/draft-ietf-oauth-status-list (+1/-3/💬3)
 1 pull requests submitted:
 - grammar fixes (by adeinega)
https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/297
 3 pull requests received 3 new comments:
 - #296 change accept header from must to should (1 by tplooker)
https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/296 - #295 some nitpicks and clarifications (1 by tplooker) https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/295 - #284 fix rendering of OID and make clear that it can be used for other status mechanisms (1 by tplooker) https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/284
 3 pull requests merged:
 - some nitpicks and clarifications
https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/295 - fix rendering of OID and make clear that it can be used for other status mechanisms https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/284 - change accept header from must to should https://github.com/oauth-wg/draft-ietf-oauth-status-list/pull/296
* oauth-wg/draft-ietf-oauth-attestation-based-client-auth (+7/-6/💬2)
 7 pull requests submitted:
 - Updates to error handling (by panva)
https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/135 - require iat in PoP (by panva) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/134 - fix using use_attestation_challenge error parameter code for missing … (by mickrau) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/132 - Clarify that client_id in client attestation MUST be consistent with token request (by tplooker) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/129 - Editorial nit about usage of client attestation outside of OAuth (by tplooker) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/128 - Update paul's affiliation (by paulbastian) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/127 - Verification and Processing rules (by c2bo) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/126
 2 pull requests received 2 new comments:
 - #132 fix using use_attestation_challenge error parameter code for missing … 
(1 by panva)
https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/132 - #125 Remove expr from pop (1 by tplooker) https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/125
 6 pull requests merged:
 - Verification and Processing rules
https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/126 - Clarify that client_id in client attestation MUST be consistent with token request https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/129 - Editorial nit about usage of client attestation outside of OAuth https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/128 - Update paul's affiliation https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/127 - Remove expr from pop https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/125 - new proposal for challenge endpoint https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/pull/112

Repositories tracked by this digest:
-----------------------------------
* https://github.com/oauth-wg/oauth-browser-based-apps
* https://github.com/oauth-wg/oauth-identity-chaining
* https://github.com/oauth-wg/oauth-transaction-tokens
* https://github.com/oauth-wg/oauth-sd-jwt-vc
* https://github.com/oauth-wg/draft-ietf-oauth-resource-metadata
* https://github.com/oauth-wg/oauth-cross-device-security
* https://github.com/oauth-wg/oauth-selective-disclosure-jwt
* https://github.com/oauth-wg/oauth-v2-1
* https://github.com/oauth-wg/draft-ietf-oauth-status-list
* https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth


--
To have a summary like this sent to your list, see: 
https://github.com/ietf-github-services/activity-summary
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to