Skip to content

Commit f9923f9

Browse files
authored
Merge pull request #3881 from handrews/shilpa-fix-openid-311
OpenID Connect Core URL fix (3.1.1 port of #3607)
2 parents 7ca63b5 + c034f86 commit f9923f9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

versions/3.1.1.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -3430,7 +3430,7 @@ animals:
34303430

34313431
Defines a security scheme that can be used by the operations.
34323432

3433-
Supported schemes are HTTP authentication, an API key (either as a header, a cookie parameter or as a query parameter), mutual TLS (use of a client certificate), OAuth2's common flows (implicit, password, client credentials and authorization code) as defined in [RFC6749](https://tools.ietf.org/html/rfc6749), and [RFC8414](https://datatracker.ietf.org/doc/html/rfc8414).
3433+
Supported schemes are HTTP authentication, an API key (either as a header, a cookie parameter or as a query parameter), mutual TLS (use of a client certificate), OAuth2's common flows (implicit, password, client credentials and authorization code) as defined in [RFC6749](https://tools.ietf.org/html/rfc6749), and [OpenID Connect Core](https://openid.net/specs/openid-connect-core-1_0.html).
34343434
Please note that as of 2020, the implicit flow is about to be deprecated by [OAuth 2.0 Security Best Current Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics). Recommended for most use case is Authorization Code Grant flow with PKCE.
34353435

34363436
##### Fixed Fields

0 commit comments

Comments
 (0)