@@ -1019,15 +1019,15 @@ The authorization server MUST only rely on client authentication if the
10191019process of issuance/registration and distribution of the underlying
10201020credentials ensures their confidentiality.
10211021
1022- If the client is confidential, the authorization server MAY accept any
1022+ For confidential clients , the authorization server MAY accept any
10231023form of client authentication meeting its security requirements
1024- (e.g., password , public/private key pair).
1024+ (e.g., client secret , public/private key pair).
10251025
10261026It is RECOMMENDED to use asymmetric (public-key based) methods for
10271027client authentication such as mTLS {{RFC8705}} or using signed JWTs
10281028("Private Key JWT") in accordance with {{RFC7521}}, {{RFC7523}},
10291029and their update {{I-D.ietf-oauth-rfc7523bis}}
1030- (in {{OpenID}} defined as the client authentication method `private_key_jwt`).
1030+ (defined in {{OpenID}} as the client authentication method `private_key_jwt`).
10311031When such methods for client authentication are used, authorization
10321032servers do not need to store sensitive symmetric keys, making these
10331033methods more robust against a number of attacks.
@@ -1057,7 +1057,7 @@ See {{security-client-authentication}} for additional details.
10571057
10581058# ## Client Secret {#client-secret}
10591059
1060- To support clients in possession of a client secret,
1060+ To support confidential clients in possession of a client secret,
10611061the authorization server MUST support the client including the
10621062client credentials in the request body content using the following
10631063parameters :
0 commit comments