<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-oauth-roadmap-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="OAuth 2.0 Roadmap">A Comprehensive Roadmap for OAuth 2.0 Standards and Drafts</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-oauth-roadmap-00"/>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <area>Security</area>
    <workgroup>OAuth Working Group</workgroup>
    <keyword>OAuth</keyword>
    <keyword>Roadmap</keyword>
    <keyword>Security</keyword>
    <keyword>Authorization</keyword>
    <keyword>RFC</keyword>
    <abstract>
      <?line 46?>

<t>The OAuth 2.0 ecosystem has expanded significantly since the publication of RFC 6749, resulting in a complex landscape of extensions, security best practices (BCPs), and application-specific profiles. This complexity can be daunting for implementers, architects, and security auditors. This document serves as a comprehensive roadmap to navigate this landscape. It categorizes key RFCs and active Internet-Drafts into functional areas, explains the relationships between them, and provides context on their evolution. The goal is to help readers understand the current state-of-the-art, select the appropriate specifications for their use cases, and follow the latest security best practices, while also offering a glimpse into the future directions of the framework.</t>
    </abstract>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document categorizes specifications within the OAuth ecosystem into three groups:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Published RFCs</strong>: Form the cornerstone of current standards and best practices.</t>
        </li>
        <li>
          <t><strong>Active Drafts</strong>: Represent features and future directions actively being developed by the working group.</t>
        </li>
        <li>
          <t><strong>Historical Drafts</strong>: Are expired or superseded but provide valuable context for understanding the design decisions and technical evolution of OAuth.</t>
        </li>
      </ul>
      <t>This roadmap is intended to guide implementers, architects, and security professionals through the extensive library of OAuth specifications, helping them select the appropriate documents for their use cases.</t>
      <artwork><![CDATA[
      +-------------------------------------------------+
      |             Core: RFC 6749 (OAuth 2.0)          |
      |             Core: RFC 6750 (Bearer Token)       |
      +------------------------+------------------------+
                               |
            +------------------+------------------+
            |                                     |
+-----------v------------+             +-----------v-----------+
|   OAuth 2.1 (Draft)    |             |Security BCP (RFC 9728)|
|(Consolidates & Hardens)|             | (Overall Guidance)    |
+------------------------+             +-----------------------+
            |
+-----------+------------------------------------------------------------+
| Foundational Extensions & Security Mechanisms                          |
+------------------------------------------------------------------------+
|                                                                        |
|  - RFC 7636 (PKCE): Protects code flow                                 |
|  - RFC 9126 (PAR) / RFC 9101 (JAR): Protect authorization requests     |
|  - RFC 9449 (DPoP) / RFC 8705 (mTLS): Sender-constrains tokens         |
|  - RFC 8707 (Resource Indicators): Prevents token misuse               |
|  - RFC 7519 (JWT): De-facto token format                               |
|                                                                        |
+------------------------------------------------------------------------+
            |
+-----------+------------------------------------------------------------+
| Advanced Capabilities & Grant Types                                    |
+------------------------------------------------------------------------+
|                                                                        |
|  - RFC 8693 (Token Exchange): Service-to-service delegation            |
|  - RFC 8628 (Device Grant): Input-constrained devices                  |
|  - RFC 9396 (RAR): Fine-grained authorization                          |
|                                                                        |
+------------------------------------------------------------------------+
   
   Figure 1: High-Level Relationship of Core OAuth 2.0 Specifications

]]></artwork>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref>.</t>
      <t>Readers are expected to be familiar with the terms and concepts described in the core OAuth 2.0 Framework <xref target="RFC6749"/>.</t>
    </section>
    <section anchor="core">
      <name>Core &amp; Foundational Documents</name>
      <ul spacing="normal">
        <li>
          <t><strong><tt>RFC 6749</tt></strong>, The OAuth 2.0 Authorization Framework (S): The seminal specification for OAuth 2.0, defining the core roles (client, resource owner, authorization server, resource server), grant types, and authorization flows.</t>
        </li>
        <li>
          <t><strong><tt>RFC 6750</tt></strong>, The OAuth 2.0 Authorization Framework: Bearer Token Usage (S): Defines the most common access token type, the "Bearer" token. A bearer token can be used by anyone who possesses it, making its transport and storage security critical.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-v2-1</tt></strong>, The OAuth 2.1 Authorization Framework (Draft): This effort consolidates and simplifies the original framework for modern applications. It formalizes a decade of security best practices by <strong>mandating</strong> PKCE, redirect URI exact matching, and the use of the Authorization Code flow. It explicitly <strong>deprecates</strong> insecure grants like the Implicit Grant and the Resource Owner Password Credentials Grant, providing a more secure baseline for new deployments.</t>
        </li>
      </ul>
    </section>
    <section anchor="security-framework">
      <name>Security Framework &amp; Best Practices</name>
      <section anchor="overall-security-guidance">
        <name>Overall Security Guidance</name>
        <ul spacing="normal">
          <li>
            <t><strong><tt>RFC 6819</tt></strong>, OAuth 2.0 Threat Model and Security Considerations (I): An early comprehensive security document that analyzes various threat models (e.g., token leakage, open redirectors) and proposes countermeasures. While still useful, many of its recommendations have been superseded by <tt>RFC9728</tt>.</t>
          </li>
          <li>
            <t><strong><tt>RFC 9728</tt></strong>, OAuth 2.0 Security Best Current Practice (B): The current definitive security guide. It consolidates the latest security lessons and provides a concrete set of recommendations that all modern implementations SHOULD follow.</t>
          </li>
          <li>
            <t><strong><tt>draft-ietf-oauth-security-topics-update</tt></strong> (Draft): The draft name for the work that eventually became <tt>RFC9728</tt>, representing the continuous evolution of security guidance within the working group.</t>
          </li>
        </ul>
      </section>
      <section anchor="protecting-the-authorization-flow">
        <name>Protecting the Authorization Flow</name>
        <ul spacing="normal">
          <li>
            <t><strong><tt>RFC 7636</tt></strong>, Proof Key for Code Exchange (PKCE) (S): Protects the Authorization Code flow from interception attacks. <strong>Originally designed for public clients (like mobile apps) that cannot securely store a secret, PKCE is now a BCP for all client types, including confidential ones</strong>, as it provides a robust defense-in-depth against code injection.</t>
          </li>
          <li>
            <t><strong><tt>RFC 9101</tt></strong>, JWT-Secured Authorization Request (JAR) (S): Ensures the integrity and authenticity of authorization request parameters by packaging them into a signed (and optionally encrypted) JWT. This prevents attackers from tampering with parameters like <tt>redirect_uri</tt> or <tt>scope</tt>.</t>
          </li>
          <li>
            <t><strong><tt>RFC 9126</tt></strong>, Pushed Authorization Requests (PAR) (S): Enhances security and privacy by allowing a client to push its authorization request parameters directly to the authorization server via a secure backchannel. This returns a <tt>request_uri</tt> which the client then sends through the browser. <strong>PAR protects request parameters from being exposed to the user agent (browser) or in server logs</strong>, and it works very well in combination with JAR for a fully secured request.</t>
          </li>
        </ul>
      </section>
      <section anchor="securing-access-tokens-sender-constraining">
        <name>Securing Access Tokens (Sender-Constraining)</name>
        <ul spacing="normal">
          <li>
            <t><strong><tt>RFC 8705</tt></strong>, Mutual-TLS Client Authentication and Certificate-Bound Access Tokens (S): A powerful mechanism that provides two functions: first, it defines a strict client authentication method using TLS certificates. Second, it enables the binding of access tokens to a specific client certificate, ensuring that even if a token is stolen, it cannot be used by an attacker who does not possess the client's private key.</t>
          </li>
          <li>
            <t><strong><tt>RFC 9449</tt></strong>, Demonstrating Proof-of-Possession (DPoP) (S): A lightweight, application-level sender-constraint mechanism. It binds a token to a specific client's public/private key pair without relying on mutual-TLS. This makes it suitable for browser-based applications and other environments where mTLS is difficult to deploy.</t>
          </li>
          <li>
            <t><strong><tt>draft-ietf-oauth-refresh-token-expiration</tt></strong> (Draft): Provides critical security best practices for refresh tokens, including recommendations for rotation (issuing a new refresh token with each use) and setting expiration policies to mitigate the risks of refresh token leakage.</t>
          </li>
        </ul>
      </section>
      <section anchor="mitigating-logical-implementation-flaws">
        <name>Mitigating Logical &amp; Implementation Flaws</name>
        <ul spacing="normal">
          <li>
            <t><strong><tt>RFC 8707</tt></strong>, Resource Indicators for OAuth 2.0 (S): Allows a client to specify the intended resource server (API) during the authorization request. This enables the Authorization Server to issue an audience-restricted token, preventing a token intended for one API from being replayed at another.</t>
          </li>
          <li>
            <t><strong><tt>RFC 9207</tt></strong>, Authorization Server Issuer Identification (S): Prevents "mix-up" attacks where a malicious authorization server could trick a client into sending a code to the wrong token endpoint. It requires the AS to declare its <tt>issuer</tt> identifier and clients/RSs to validate it.</t>
          </li>
          <li>
            <t><strong><tt>draft-ietf-oauth-mix-up-mitigation</tt></strong> (Draft): Provides comprehensive strategies to mitigate various "mix-up attacks" where a credential (e.g., a code, token, or client secret) might be sent to the wrong entity, expanding on the protections offered by <tt>RFC9207</tt>.</t>
          </li>
          <li>
            <t><strong><tt>draft-ietf-oauth-cross-device-security</tt></strong> (Draft): Specifically analyzes and proposes mitigations for security threats in cross-device flows, such as the Device Authorization Grant (<tt>RFC8628</tt>).</t>
          </li>
        </ul>
      </section>
      <section anchor="advanced-client-authentication">
        <name>Advanced Client Authentication</name>
        <ul spacing="normal">
          <li>
            <t><strong><tt>draft-ietf-oauth-attestation-based-client-auth</tt></strong> (Draft): Defines a client authentication method where the client must provide an attestation from a trusted third party (e.g., a device manufacturer or platform vendor), suitable for high-security scenarios where the client's integrity must be verified.</t>
          </li>
          <li>
            <t><strong><tt>draft-ietf-oauth-spiffe-client-auth</tt></strong> (Draft): Defines client authentication using SPIFFE SVIDs (Verifiable Identity Documents), designed to provide strong, cryptographic workload identity in cloud-native and service mesh environments.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="tokens">
      <name>Token Management &amp; Formats</name>
      <ul spacing="normal">
        <li>
          <t><strong><tt>RFC 7009</tt></strong>, Token Revocation (S): Defines an endpoint for clients to proactively invalidate a refresh or access token, for example, when a user logs out.</t>
        </li>
        <li>
          <t><strong><tt>RFC 7662</tt></strong>, Token Introspection (S): Defines an endpoint for resource servers to check the validity and metadata of a token with the authorization server. This is particularly useful for opaque (non-JWT) tokens.</t>
        </li>
        <li>
          <t><strong><tt>RFC 7519</tt></strong>, JSON Web Token (JWT) (S): Defines the JWT format, the de facto standard for structured, self-contained tokens in the OAuth ecosystem.</t>
        </li>
        <li>
          <t><strong><tt>RFC 8725</tt></strong>, JSON Web Token Best Current Practices (B): Provides essential security best practices for implementing and using JWTs, such as algorithm validation (<tt>alg</tt> header) and claim verification.  </t>
          <ul spacing="normal">
            <li>
              <t><strong><tt>draft-ietf-oauth-rfc8725bis</tt></strong> (Draft): An effort to update <tt>RFC8725</tt> with new security advice and clarifications based on implementation experience.</t>
            </li>
          </ul>
        </li>
        <li>
          <t><strong><tt>RFC 9278</tt></strong>, JWT Profile for OAuth 2.0 Access Tokens (S): An official profile defining a recommended set of claims (like <tt>iss</tt>, <tt>exp</tt>, <tt>aud</tt>, <tt>client_id</tt>) for using a JWT as an OAuth 2.0 access token, promoting interoperability.</t>
        </li>
      </ul>
    </section>
    <section anchor="metadata">
      <name>Client Registration, Metadata &amp; Discovery</name>
      <ul spacing="normal">
        <li>
          <t><strong><tt>RFC 7591</tt></strong>, Dynamic Client Registration (S): Allows OAuth clients to register with an authorization server programmatically, automating the onboarding process.</t>
        </li>
        <li>
          <t><strong><tt>RFC 7592</tt></strong>, Dynamic Client Registration Management (S): Complements <tt>RFC7591</tt> by defining a protocol for updating and deleting client registrations.</t>
        </li>
        <li>
          <t><strong><tt>RFC 8414</tt></strong>, Authorization Server Metadata (S): Allows an AS to publish its configuration details (like endpoint URLs and supported capabilities) at a well-known URI, enabling dynamic discovery by clients.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-client-id-metadata-document</tt></strong> (Draft): Proposes a mechanism for clients to also publish a metadata document, declaring their software information and configuration to enhance transparency and security for authorization servers.</t>
        </li>
      </ul>
    </section>
    <section anchor="grants">
      <name>Grant Types &amp; Assertion Framework</name>
      <ul spacing="normal">
        <li>
          <t><strong><tt>RFC 7521</tt></strong>, Assertion Framework (S): Provides a general framework for using assertions (like SAML or JWT) for client authentication and as authorization grants. This is foundational for service-to-service communication.</t>
        </li>
        <li>
          <t><strong><tt>RFC 7523</tt></strong>, JWT Profile for Authorization Grants (S): A concrete implementation of <tt>RFC7521</tt> using JWTs as assertions. This allows a client to use a JWT to request an access token without a direct user interaction.  </t>
          <ul spacing="normal">
            <li>
              <t><strong><tt>draft-ietf-oauth-rfc7523bis</tt></strong> (Draft): Aims to update <tt>RFC7523</tt> to address ambiguities and align with modern security practices.</t>
            </li>
          </ul>
        </li>
        <li>
          <t><strong><tt>RFC 8628</tt></strong>, Device Authorization Grant (S): The "Device Flow," designed for input-constrained devices (like smart TVs or CLIs) that cannot host a web browser for user authentication.</t>
        </li>
        <li>
          <t><strong><tt>RFC 8693</tt></strong>, Token Exchange (S): A versatile grant type that allows a service to exchange one type of security token for another. <strong>This is the cornerstone of modern microservices security, enabling use cases like impersonation (a frontend service acting on behalf of a user) and delegation (a service calling another service with a more restricted token).</strong></t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-identity-assertion-authz-grant</tt></strong> (Draft): Proposes a new grant type that allows a client to use an identity assertion (like an ID Token from an external IdP) to obtain an access token, streamlining federated identity scenarios.</t>
        </li>
      </ul>
    </section>
    <section anchor="advanced-authz">
      <name>Advanced Authorization Capabilities</name>
      <ul spacing="normal">
        <li>
          <t><strong><tt>RFC 9396</tt></strong>, Rich Authorization Requests (RAR) (S): Extends OAuth to allow clients to request structured, fine-grained authorization (e.g., access to specific bank accounts with specific transaction limits) beyond simple string-based scopes.</t>
        </li>
        <li>
          <t><strong><tt>RFC 9901</tt></strong>, Incremental Authorization for OAuth 2.0 (S): Allows a client to request additional permissions (scopes) from a user without forcing them to re-approve the permissions that were already granted.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-transaction-tokens</tt></strong> (Draft): Explores the use of short-lived tokens bound to a specific transaction to enhance security for high-risk operations like financial payments, building on ideas from RAR and sender-constraining.</t>
        </li>
      </ul>
    </section>
    <section anchor="client-profiles">
      <name>Client-Specific Profiles &amp; BCPs</name>
      <ul spacing="normal">
        <li>
          <t><strong><tt>RFC 8252</tt></strong>, OAuth 2.0 for Native Apps (B): Provides best current practices for implementing OAuth 2.0 in native mobile and desktop applications. It recommends using external user agents (like the system browser) and custom URI schemes or claimed "https" schemes for handling redirects.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-browser-based-apps</tt></strong> (Draft): The definitive guide for implementing OAuth 2.0 in Single-Page Applications (SPAs). It <strong>recommends the Authorization Code flow with PKCE and deprecates the Implicit Grant</strong>. It also provides guidance on token storage (e.g., using backend-for-frontend patterns) and mitigating threats like Cross-Site Scripting (XSS).</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-first-party-apps</tt></strong> (Draft): Offers specific security and implementation guidance for first-party applications, where the client and authorization server belong to the same entity, allowing for certain optimizations while maintaining security.</t>
        </li>
      </ul>
    </section>
    <section anchor="oidc">
      <name>Relationship with OpenID Connect</name>
      <t>While this document focuses on the OAuth 2.0 authorization framework, it is crucial to mention OpenID Connect (OIDC) <xref target="OIDC"/>. OIDC is a simple identity layer built on top of OAuth 2.0 that provides authentication and enables clients to verify the identity of the end-user. Many modern OAuth deployments use OIDC for user login and to obtain an ID Token, and then leverage standard OAuth mechanisms for API authorization using the Access Token. Understanding the distinction and synergy between OAuth (for "what a user can do") and OIDC (for "who the user is") is fundamental for many use cases.</t>
    </section>
    <section anchor="emerging-tech">
      <name>Advanced &amp; Emerging Technologies</name>
      <t>Specifications in this area often intersect with decentralized identity, Verifiable Credentials (VCs), and privacy-enhancing technologies.</t>
      <ul spacing="normal">
        <li>
          <t><strong><tt>draft-ietf-oauth-sd-jwt-vc</tt></strong> (Draft): Defines how to carry Verifiable Credentials (VCs) using Selectively Disclosable JWTs (SD-JWTs), allowing users to disclose only necessary identity attributes during an OAuth flow, enhancing user privacy.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-status-list</tt></strong> (Draft): Proposes an efficient and privacy-preserving mechanism for checking the revocation status of credentials (like VCs) at scale.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-identity-chaining</tt></strong> (Draft): Explores a mechanism to securely pass and link multiple identity and authorization contexts during token exchange, forming a verifiable "identity chain." This is highly relevant for complex delegation scenarios in microservices.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-gnap-core-protocol</tt></strong> (Draft): Represents the next generation of authorization protocols, sometimes referred to as "OAuth 3.0" in spirit. GNAP (Grant Negotiation and Authorization Protocol) is a ground-up redesign aimed at addressing the complexities learned from OAuth 2.0. It features a unified request/response structure, native support for sender-constraining, fine-grained authorization, and better separation of concerns. While not a direct extension of OAuth 2.0, it represents a major future direction for the IETF's work in this space.</t>
        </li>
      </ul>
    </section>
    <section anchor="historical">
      <name>Historical &amp; Superseded Documents</name>
      <t>These expired drafts are valuable for understanding the evolution of OAuth. They represent early explorations of ideas, some of which evolved into the standards we use today.</t>
      <ul spacing="normal">
        <li>
          <t><strong><tt>draft-ietf-oauth-authentication</tt></strong> / <strong><tt>draft-ietf-oauth-web-delegation</tt></strong>: Very early drafts that explored building an authentication layer on top of OAuth 2.0, serving as precursors to OpenID Connect.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-v2-http-mac</tt></strong>: Proposed a Message Authentication Code (MAC) token type as an alternative to Bearer tokens for stronger request signing, but it was not widely adopted due to complexity.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-pop-architecture</tt></strong> / <strong><tt>draft-ietf-oauth-pop-key-distribution</tt></strong>: Laid the early architectural foundation for "Proof-of-Possession" (PoP) tokens, whose core ideas evolved into the more mature mTLS (<tt>RFC8705</tt>) and DPoP (<tt>RFC9449</tt>) specifications.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-token-binding</tt></strong>: An early attempt at sender-constraint that aimed to bind OAuth tokens to the underlying TLS channel, but the underlying Token Binding protocol it depended on was not finalized by the IETF.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-closing-redirectors</tt></strong>: Specifically discussed and proposed solutions for mitigating the Open Redirector vulnerability, with its ideas being integrated into mainstream security best practices.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-use-cases</tt></strong>: An early document used to collect and articulate the use cases that shaped the design of OAuth 2.0.</t>
        </li>
        <li>
          <t><strong><tt>draft-ietf-oauth-distributed</tt></strong> / <strong><tt>draft-ietf-oauth-reciprocal</tt></strong>: Explored authorization models for distributed and peer-to-peer scenarios, with some concepts finding more mature expression in specifications like Token Exchange (<tt>RFC8693</tt>).</t>
        </li>
      </ul>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>This document is a roadmap that provides a guide to the OAuth 2.0 family of specifications; it does not define a protocol itself. As such, it does not introduce any new security considerations. The security of an OAuth 2.0 implementation depends on the proper application of the standards and best practices described in the referenced documents.</t>
      <t>Readers are strongly encouraged to consult the security considerations sections of each individual RFC and draft. In particular, the following documents provide comprehensive security guidance and are considered essential reading for all implementers:</t>
      <ul spacing="normal">
        <li>
          <t><strong>OAuth 2.0 Security Best Current Practice</strong> <xref target="RFC9728"/>: The primary and most up-to-date guide for securing OAuth 2.0 deployments.</t>
        </li>
        <li>
          <t><strong>OAuth 2.0 for Native Apps</strong> <xref target="RFC8252"/>: Essential security practices for mobile and desktop applications.</t>
        </li>
        <li>
          <t><strong>JSON Web Token (JWT) Best Current Practices</strong> <xref target="RFC8725"/>: Critical guidance for anyone using JWTs as access tokens or in other contexts.</t>
        </li>
      </ul>
      <t>Implementers should pay close attention to the evolution of security drafts, such as <tt>draft-ietf-oauth-v2-1</tt>, which aim to simplify and harden the core framework.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC6749">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="RFC9728">
        <front>
          <title>OAuth 2.0 Protected Resource Metadata</title>
          <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
          <author fullname="P. Hunt" initials="P." surname="Hunt"/>
          <author fullname="A. Parecki" initials="A." surname="Parecki"/>
          <date month="April" year="2025"/>
          <abstract>
            <t>This specification defines a metadata format that an OAuth 2.0 client or authorization server can use to obtain the information needed to interact with an OAuth 2.0 protected resource.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9728"/>
        <seriesInfo name="DOI" value="10.17487/RFC9728"/>
      </reference>
      <reference anchor="RFC8252">
        <front>
          <title>OAuth 2.0 for Native Apps</title>
          <author fullname="W. Denniss" initials="W." surname="Denniss"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <date month="October" year="2017"/>
          <abstract>
            <t>OAuth 2.0 authorization requests from native apps should only be made through external user-agents, primarily the user's browser. This specification details the security and usability reasons why this is the case and how native apps and authorization servers can implement this best practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="212"/>
        <seriesInfo name="RFC" value="8252"/>
        <seriesInfo name="DOI" value="10.17487/RFC8252"/>
      </reference>
      <reference anchor="RFC8725">
        <front>
          <title>JSON Web Token Best Current Practices</title>
          <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
          <author fullname="D. Hardt" initials="D." surname="Hardt"/>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="February" year="2020"/>
          <abstract>
            <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="225"/>
        <seriesInfo name="RFC" value="8725"/>
        <seriesInfo name="DOI" value="10.17487/RFC8725"/>
      </reference>
      <reference anchor="OIDC" target="https://openid.net/connect/">
        <front>
          <title>OpenID Connect</title>
          <author>
            <organization>OpenID Foundation</organization>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
