<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="oauth-parameters.xsl"?>
<?xml-model href="oauth-parameters.rng" schematypens="http://relaxng.org/ns/structure/1.0" ?>
<registry xmlns="http://www.iana.org/assignments" id="oauth-parameters">
  <title>OAuth Parameters</title>
  <created>2012-07-27</created>
  <updated>2026-03-25</updated>
  
  <registry id="token-types">
    <title>OAuth Access Token Types</title>
    <xref type="rfc" data="rfc6749"/>
    <xref type="rfc" data="rfc8414"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Hannes Tschofenig, Mike Jones</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc6749"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record>
      <name>Bearer</name>
      <additional/>
      <http>Bearer</http>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6750"/>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>N_A</name>
      <additional/>
      <http/>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.2.1</xref>
    </record>
    <record date="2021-07-27">
      <name>PoP</name>
      <additional>cnf, rs_cnf (see section 3.1 of <xref type="rfc" data="rfc8747"/> 
        and section 3.2 of <xref type="rfc" data="rfc9201"/>).</additional>
      <http>N/A</http>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200"/>
    </record>
    <record date="2023-05-01">
      <name>DPoP</name>
      <additional/>
      <http>DPoP</http>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9449"/>
    </record>
  </registry>
  
  <registry id="endpoint">
    <title>OAuth Authorization Endpoint Response Types</title>
    <xref type="rfc" data="rfc6749"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Hannes Tschofenig, Mike Jones</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc6749"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record>
      <name>code</name>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>code id_token</name>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record>
      <name>code id_token token</name>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record>
      <name>code token</name>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record>
      <name>id_token</name>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record>
      <name>id_token token</name>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record>
      <name>none</name>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record>
      <name>token</name>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record date="2025-10-02">
      <name>vp_token</name>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#response">OpenID for Verifiable Presentations 1.0, Section 8</xref>
    </record>
    <record date="2025-10-02">
      <name>vp_token id_token</name>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#response">OpenID for Verifiable Presentations 1.0, Section 8</xref>
    </record>
  </registry>
  
  <registry id="extensions-error">
    <title>OAuth Extensions Error Registry</title>
    <xref type="rfc" data="rfc6749"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Hannes Tschofenig, Mike Jones</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc6749"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record updated="2026-02-04">
      <name>invalid_request</name>
      <usage>authorization endpoint, token endpoint, resource access error response</usage>
      <protocol>OAuth 2.0 Authorization Framework, bearer access token type</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
      <xref type="rfc" data="rfc6750"/>
    </record>
    <record date="2026-02-04">
      <name>unauthorized_client</name>
      <usage>authorization endpoint, token endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>access_denied</name>
      <usage>authorization endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>unsupported_response_type</name>
      <usage>authorization endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>invalid_scope</name>
      <usage>authorization endpoint, token endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>server_error</name>
      <usage>authorization endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>temporarily_unavailable</name>
      <usage>authorization endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>invalid_client</name>
      <usage>token endpoint, authorization endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>invalid_grant</name>
      <usage>token endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record date="2026-02-04">
      <name>unsupported_grant_type</name>
      <usage>token endpoint</usage>
      <protocol>OAuth 2.0 Authorization Framework</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749">RFC6749</xref>
    </record>
    <record>
      <name>invalid_token</name>
      <usage>resource access error response</usage>
      <protocol>bearer access token type</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6750"/>
    </record>
    <record>
      <name>insufficient_scope</name>
      <usage>resource access error response</usage>
      <protocol>bearer access token type</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6750"/>
    </record>    
    <record>
      <name>unsupported_token_type</name>
      <usage>revocation endpoint error response</usage>
      <protocol>token revocation endpoint</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7009"/>
    </record>    
    <record date="2013-08-28">
      <name>interaction_required</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>login_required</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28" updated="2022-10-31">
      <name>account_selection_required</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>consent_required</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>invalid_request_uri</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>invalid_request_object</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2014-09-30">
      <name>request_not_supported</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2014-09-30">
      <name>request_uri_not_supported</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2014-09-30">
      <name>registration_not_supported</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Connect</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2018-04-23">
      <name>need_info (and its subsidiary parameters)</name>
      <usage>authorization server response, token endpoint</usage>
      <protocol>Kantara UMA</protocol>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.6</xref>
    </record>
    <record date="2018-04-23">
      <name>request_denied</name>
      <usage>authorization server response, token endpoint</usage>
      <protocol>Kantara UMA</protocol>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.6</xref>
    </record>
    <record date="2018-04-23">
      <name>request_submitted (and its subsidiary parameters)</name>
      <usage>authorization server response, token endpoint</usage>
      <protocol>Kantara UMA</protocol>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.6</xref>
    </record>
    <record date="2026-02-03">
      <name>invalid_redirect_uri</name>
      <usage>registration endpoint</usage>
      <protocol>Dynamic Client Registration</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7591">RFC7591, Section 3.2.2</xref>
    </record>
    <record date="2026-02-03">
      <name>invalid_client_metadata</name>
      <usage>registration endpoint</usage>
      <protocol>Dynamic Client Registration</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7591">RFC7591, Section 3.2.2</xref>
    </record>
    <record date="2026-02-03">
      <name>invalid_software_statement</name>
      <usage>registration endpoint</usage>
      <protocol>Dynamic Client Registration</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7591">RFC7591, Section 3.2.2</xref>
    </record>
    <record date="2026-02-03" updated="2026-02-09">
      <name>unapproved_software_statement</name>
      <usage>registration endpoint</usage>
      <protocol>Dynamic Client Registration</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7591">RFC7591, Section 3.2.2</xref>
    </record>
    <record date="2019-06-03">
      <name>authorization_pending</name>
      <usage>Token endpoint response</usage>
      <protocol><xref type="rfc" data="rfc8628"/></protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 3.5</xref>
    </record>
    <record date="2019-06-03">
      <name>access_denied</name>
      <usage>Token endpoint response</usage>
      <protocol><xref type="rfc" data="rfc8628"/></protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 3.5</xref>
    </record>
    <record date="2019-06-03">
      <name>slow_down</name>
      <usage>Token endpoint response</usage>
      <protocol><xref type="rfc" data="rfc8628"/></protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 3.5</xref>
    </record>
    <record date="2019-06-03">
      <name>expired_token</name>
      <usage>Token endpoint response</usage>
      <protocol><xref type="rfc" data="rfc8628"/></protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 3.5</xref>
    </record>
    <record date="2019-06-17" updated="2019-09-13">
      <name>invalid_target</name>
      <usage>implicit grant error response, token error response</usage>
      <protocol>resource parameter</protocol>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8707"/>
    </record>
    <record date="2021-07-27">
      <name>unsupported_pop_key</name>
      <usage>token error response</usage>
      <protocol><xref type="rfc" data="rfc9200"/></protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Section 5.8.3</xref>
    </record>
    <record date="2021-07-27">
      <name>incompatible_ace_profiles</name>
      <usage>token error response</usage>
      <protocol><xref type="rfc" data="rfc9200"/></protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Section 5.8.3</xref>
    </record>
    <record date="2023-01-04">
      <name>invalid_authorization_details</name>
      <usage>token endpoint, authorization endpoint</usage>
      <protocol>OAuth 2.0 Rich Authorization Requests</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9396">RFC9396, Section 5</xref>
    </record>
    <record date="2023-05-01">
      <name>invalid_dpop_proof</name>
      <usage>token error response, resource access error response</usage>
      <protocol>Demonstrating Proof of Possession (DPoP)</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9449"/>
    </record>
    <record date="2023-05-01">
      <name>use_dpop_nonce</name>
      <usage>token error response, resource access error response</usage>
      <protocol>Demonstrating Proof of Possession (DPoP)</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9449"/>
    </record>
    <record date="2023-06-29">
      <name>insufficient_user_authentication</name>
      <usage>resource access error response</usage>
      <protocol>OAuth 2.0 Step Up Authentication Challenge Protocol</protocol>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9470">RFC9470, Section 3</xref>
    </record>
    <record date="2026-02-07">
      <name>invalid_issuer</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-07">
      <name>invalid_subject</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-07">
      <name>invalid_trust_anchor</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-07">
      <name>invalid_trust_chain</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-07">
      <name>invalid_metadata</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-07">
      <name>not_found</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-07">
      <name>unsupported_parameter</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID Federation</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#error_response">Section 8.9 of OpenID Federation 1.0</xref>
    </record>
    <record date="2025-10-02">
      <name>vp_formats_not_supported</name>
      <usage>authorization endpoint, token endpoint</usage>
      <protocol>OpenID for Verifiable Presentations</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#error-response">OpenID for Verifiable Presentations 1.0, Section 8.5</xref>
    </record>
    <record date="2025-10-02">
      <name>invalid_request_uri_method</name>
      <usage>authorization endpoint</usage>
      <protocol>OpenID for Verifiable Presentations</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#error-response">OpenID for Verifiable Presentations 1.0, Section 8.5</xref>
    </record>
    <record date="2025-10-02">
      <name>wallet_unavailable</name>
      <usage>authorization endpoint, token endpoint</usage>
      <protocol>OpenID for Verifiable Presentations</protocol>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#error-response">OpenID for Verifiable Presentations 1.0, Section 8.5</xref>
    </record>
  </registry>
  
  <registry id="parameters">
    <title>OAuth Parameters</title>
    <xref type="rfc" data="rfc6749"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Hannes Tschofenig, Mike Jones</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc6749"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record>
      <name>client_id</name>
      <usage>authorization request, token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>client_secret</name>
      <usage>token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>response_type</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>redirect_uri</name>
      <usage>authorization request, token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>scope</name>
      <usage>authorization request, authorization response, token request, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>state</name>
      <usage>authorization request, authorization response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>code</name>
      <usage>authorization response, token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record date="2014-09-30">
  
      <name>error</name>
      <usage>authorization response, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>error_description</name>
      <usage>authorization response, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>error_uri</name>
      <usage>authorization response, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>grant_type</name>
      <usage>token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>access_token</name>
      <usage>authorization response, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>token_type</name>
      <usage>authorization response, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>expires_in</name>
      <usage>authorization response, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>username</name>
      <usage>token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>password</name>
      <usage>token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record>
      <name>refresh_token</name>
      <usage>token request, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc6749"/>
    </record>
    <record date="2013-08-28">
      <name>nonce</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>display</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>prompt</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>max_age</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>ui_locales</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>claims_locales</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>id_token_hint</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>login_hint</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>acr_values</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>claims</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28">
      <name>registration</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>request</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>request_uri</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>    
    <record date="2013-08-28">
      <name>id_token</name>
      <usage>authorization response, access token response</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2013-08-28" updated="2022-09-23">
      <name>session_state</name>
      <usage>authorization response, access token response</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-session-1_0.html#CreatingUpdatingSessions">OpenID Connect Session Management 1.0, Section 2</xref>
    </record>
    <record date="2015-01-12">
      <name>assertion</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7521"/>
    </record>
    <record date="2015-01-12">
      <name>client_assertion</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7521"/>
    </record>
    <record date="2015-01-12">
      <name>client_assertion_type</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7521"/>
    </record>
    <record date="2015-07-21">
      <name>code_verifier</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7636"/>
    </record>
    <record date="2015-07-21">
      <name>code_challenge</name>
      <usage>authorization request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7636"/>
    </record>
    <record date="2015-07-21">
      <name>code_challenge_method</name>
      <usage>authorization request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7636"/>
    </record>
    <record date="2018-04-23">
      <name>claim_token</name>
      <usage>client request, token endpoint</usage>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.1</xref>
    </record>
    <record date="2018-04-23">
      <name>pct</name>
      <usage>client request, token endpoint</usage>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.1</xref>
    </record>
    <record date="2018-04-23">
      <name>pct</name>
      <usage>authorization server response, token endpoint</usage>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.5</xref>
    </record>
    <record date="2018-04-23">
      <name>rpt</name>
      <usage>client request, token endpoint</usage>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.1</xref>
    </record>
    <record date="2018-04-23">
      <name>ticket</name>
      <usage>client request, token endpoint</usage>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.1</xref>
    </record>
    <record date="2018-04-23">
      <name>upgraded</name>
      <usage>authorization server response, token endpoint</usage>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html">UMA 2.0 Grant for OAuth 2.0, Section 3.3.5</xref>
    </record>
    <record date="2018-08-23">
      <name>vtr</name>
      <usage>authorization request, token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8485"/>
    </record>
    <record date="2019-06-07">
      <name>device_code</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 3.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-09-13">
      <name>resource</name>
      <usage>authorization request, token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8707"/>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>audience</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>requested_token_type</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>subject_token</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>subject_token_type</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>actor_token</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>actor_token_type</name>
      <usage>token request</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <name>issued_token_type</name>
      <usage>token response</usage>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.2.1</xref>
    </record>
    <record date="2019-07-19">
      <name>response_mode</name>
      <usage>Authorization Request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html">OAuth 2.0 Multiple Response Type Encoding Practices</xref>
    </record>
    <record date="2020-01-15">
      <name>nfv_token</name>
      <usage>Access Token Response</usage>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2020-09-08" updated="2022-01-26">
      <name>iss</name>
      <usage>authorization request, authorization response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9207">RFC9207, Section 2</xref>
      <xref type="rfc" data="rfc9101"/>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.1</xref>
    </record>
    <record date="2020-09-08">
      <name>sub</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.2</xref>
      <xref type="rfc" data="rfc9101"/>
    </record>
    <record date="2020-09-08">
      <name>aud</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.3</xref>
      <xref type="rfc" data="rfc9101"/>
    </record>
    <record date="2020-09-08">
      <name>exp</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.4</xref>
      <xref type="rfc" data="rfc9101"/>
    </record>
    <record date="2020-09-08">
      <name>nbf</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.5</xref>
      <xref type="rfc" data="rfc9101"/>
    </record>
    <record date="2020-09-08">
      <name>iat</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.6</xref>
      <xref type="rfc" data="rfc9101"/>
    </record>
    <record date="2020-09-08">
      <name>jti</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7519">RFC7519, Section 4.1.7</xref>
      <xref type="rfc" data="rfc9101"/>
    </record>
    <record date="2021-07-27">
      <name>ace_profile</name>
      <usage>token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Sections 5.8.2, 5.8.4.3</xref>
    </record>
    <record date="2021-08-12">
      <name>nonce1</name>
      <usage>client-rs request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9203"/>
    </record>
    <record date="2021-08-12">
      <name>nonce2</name>
      <usage>rs-client response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9203"/>
    </record>
    <record date="2021-08-12">
      <name>ace_client_recipientid</name>
      <usage>client-rs request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9203"/>
    </record>
    <record date="2021-08-12">
      <name>ace_server_recipientid</name>
      <usage>rs-client response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9203"/>
    </record>
    <record date="2021-09-07">
      <name>req_cnf</name>
      <usage>token request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9201">RFC9201, Section 5</xref>
    </record>
    <record date="2021-09-07">
      <name>rs_cnf</name>
      <usage>token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9201">RFC9201, Section 5</xref>
    </record>
    <record date="2021-09-07">
      <name>cnf</name>
      <usage>token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9201">RFC9201, Section 5</xref>
    </record>
    <record date="2023-01-04">
      <name>authorization_details</name>
      <usage>authorization request, token request, token response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9396"/>
    </record>
    <record date="2023-05-01">
      <name>dpop_jkt</name>
      <usage>authorization request</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9449">RFC9449, Section 10</xref>
    </record>
    <record date="2024-04-22">
      <name>sign_info</name>
      <usage>client-rs request, rs-client response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9594"/>
    </record>
    <record date="2024-04-22">
      <name>kdcchallenge</name>
      <usage>rs-client response</usage>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9594"/>
    </record>
    <record date="2024-08-05" updated="2026-02-04">
      <name>trust_chain</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#section-12.1.1.1.1">Section 12.1.1.1.1 of OpenID Federation 1.0</xref>
    </record>
    <record date="2025-10-02">
      <name>dcql_query</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#new_parameters">OpenID for Verifiable Presentations 1.0, Section 5.1</xref>
    </record>
    <record date="2025-10-02">
      <name>client_metadata</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#new_parameters">OpenID for Verifiable Presentations 1.0, Section 5.1</xref>
    </record>
    <record date="2025-10-02">
      <name>request_uri_method</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#new_parameters">OpenID for Verifiable Presentations 1.0, Section 5.1</xref>
    </record>
    <record date="2025-10-02">
      <name>transaction_data</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#new_parameters">OpenID for Verifiable Presentations 1.0, Section 5.1</xref>
    </record>
    <record date="2025-10-02">
      <name>wallet_nonce</name>
      <usage>authorization request, token response</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#request_uri_method_post">OpenID for Verifiable Presentations 1.0, Section 5.10</xref>
    </record>
    <record date="2025-10-02">
      <name>response_uri</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#response_mode_post">OpenID for Verifiable Presentations 1.0, Section 8.2</xref>
    </record>
    <record date="2025-10-02">
      <name>vp_token</name>
      <usage>authorization request, token response</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#response-parameters">OpenID for Verifiable Presentations 1.0, Section 8.1</xref>
    </record>
    <record date="2025-10-02">
      <name>verifier_info</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#new_parameters">OpenID for Verifiable Presentations 1.0, Section 5.1</xref>
    </record>
    <record date="2025-10-02">
      <name>expected_origins</name>
      <usage>authorization request</usage>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#dc_api_request">OpenID for Verifiable Presentations 1.0, Appendix A.2</xref>
    </record>
    <record date="2026-03-25">
      <name>ecdh_info</name>
      <usage>client-rs request, rs-client response</usage>
      <controller>IETF</controller>
      <xref type="draft" data="RFC-ietf-ace-key-groupcomm-oscore-21"/>
    </record>
    <record date="2026-03-25">
      <name>kdc_dh_creds</name>
      <usage>client-rs request, rs-client response</usage>
      <controller>IETF</controller>
      <xref type="draft" data="RFC-ietf-ace-key-groupcomm-oscore-21"/>
    </record>
  </registry>
  
  <registry id="token-type-hint">
    <title>OAuth Token Type Hints</title>
    <xref type="rfc" data="rfc7009"/>
    <registration_rule>Specification Required</registration_rule>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc7009"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <expert>Torsten Lodderstedt, Mike Jones</expert>
    <record>
      <name>access_token</name>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7009"/>
    </record>    
     <record>
      <name>refresh_token</name>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc7009"/>
    </record>
    <record date="2018-03-12">
      <name>pct</name>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html#token-revocation">UMA 2.0 Grant for OAuth 2.0, Section 3.7</xref>
    </record>
   </registry>
  
  <registry id="uri">
    <title>OAuth URI</title>
    <xref type="rfc" data="rfc6755"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Hannes Tschofenig, Mike Jones</expert>
    <note>Prefix: urn:ietf:params:oauth
    </note>
    <record date="2015-01-12">
      <urn>urn:ietf:params:oauth:grant-type:jwt-bearer</urn>
      <name>JWT Bearer Token Grant Type Profile for OAuth 2.0</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7523"/>
    </record>
    <record date="2015-01-12">
      <urn>urn:ietf:params:oauth:client-assertion-type:jwt-bearer</urn>
      <name>JWT Bearer Token Profile for OAuth 2.0 Client Authentication</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7523"/>
    </record>
    <record date="2015-01-12">
      <urn>urn:ietf:params:oauth:grant-type:saml2-bearer</urn>
      <name>SAML 2.0 Bearer Assertion Grant Type Profile for OAuth 2.0</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7522"/>
    </record>
    <record date="2015-01-12">
      <urn>urn:ietf:params:oauth:client-assertion-type:saml2-bearer</urn>
      <name>SAML 2.0 Bearer Assertion Profile for OAuth 2.0 Client Authentication</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7522"/>
    </record>
    <record date="2015-01-23">
      <urn>urn:ietf:params:oauth:token-type:jwt</urn>
      <name>JSON Web Token (JWT) Token Type</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7519"/>
    </record>
    <record date="2019-06-03">
      <urn>urn:ietf:params:oauth:grant-type:device_code</urn>
      <name>Device flow grant type for OAuth 2.0</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 3.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <urn>urn:ietf:params:oauth:grant-type:token-exchange</urn>
      <name>Token exchange grant type for OAuth 2.0</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 2.1</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <urn>urn:ietf:params:oauth:token-type:access_token</urn>
      <name>Token type URI for an OAuth 2.0 access token</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 3</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <urn>urn:ietf:params:oauth:token-type:refresh_token</urn>
      <name>Token type URI for an OAuth 2.0 refresh token</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 3</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <urn>urn:ietf:params:oauth:token-type:id_token</urn>
      <name>Token type URI for an ID Token</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 3</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <urn>urn:ietf:params:oauth:token-type:saml1</urn>
      <name>Token type URI for a base64url-encoded SAML 1.1 assertion</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 3</xref>
    </record>
    <record date="2019-06-17" updated="2019-07-24">
      <urn>urn:ietf:params:oauth:token-type:saml2</urn>
      <name>Token type URI for a base64url-encoded SAML 2.0 assertion</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 3</xref>
    </record>
    <record date="2021-07-30">
      <urn>urn:ietf:params:oauth:request_uri</urn>
      <name>A URN Sub-Namespace for OAuth Request URIs.</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc9126">RFC9126, Section 2.2</xref>
    </record>
    <record date="2022-06-16">
      <urn>urn:ietf:params:oauth:jwk-thumbprint</urn>
      <name>JWK Thumbprint URI</name>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc9278"/>
    </record>
    <record date="2024-09-10">
      <urn>urn:ietf:params:oauth:ckt</urn>
      <name>COSE Key Thumbprint URI</name>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9679"/>
    </record>
  </registry>

  <registry id="client-metadata">
    <title>OAuth Dynamic Client Registration Metadata</title>
    <xref type="rfc" data="rfc7591"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Justin Richer</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc7591"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record date="2015-05-12">
      <value>redirect_uris</value>
      <description>Array of redirection URIs for use in redirect-based flows</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>token_endpoint_auth_method</value>
      <description>Requested authentication method for the token endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>grant_types</value>
      <description>Array of OAuth 2.0 grant types that the client may use</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>response_types</value>
      <description>Array of the OAuth 2.0 response types that the client may use</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_name</value>
      <description>Human-readable name of the client to be presented to the user</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_uri</value>
      <description>URL of a web page providing information about the client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>logo_uri</value>
      <description>URL that references a logo for the client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>scope</value>
      <description>Space-separated list of OAuth 2.0 scope values</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>contacts</value>
      <description>Array of strings representing ways to contact people 
        responsible for this client, typically email addresses</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>tos_uri</value>
      <description>URL that points to a human-readable terms of service document 
        for the client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>policy_uri</value>
      <description>URL that points to a human-readable policy document for the 
        client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>jwks_uri</value>
      <description>URL referencing the client's JSON Web Key Set <xref type="rfc" data="rfc7517"/> 
        document representing the client's public keys</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>jwks</value>
      <description>Client's JSON Web Key Set <xref type="rfc" data="rfc7517"/> 
        document representing the client's public keys</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>software_id</value>
      <description>Identifier for the software that comprises a client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>software_version</value>
      <description>Version identifier for the software that comprises a client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_id</value>
      <description>Client identifier</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_secret</value>
      <description>Client secret</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_id_issued_at</value>
      <description>Time at which the client identifier was issued</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_secret_expires_at</value>
      <description>Time at which the client secret will expire</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-31">
      <value>registration_access_token</value>
      <description>OAuth 2.0 Bearer Token used to access
      the client configuration endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7592"/>
    </record>
    <record date="2015-05-31">
      <value>registration_client_uri</value>
      <description>Fully qualified URI of the client
      registration endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7592"/>
    </record>
    <record date="2015-12-03">
      <value>application_type</value>
      <description>Kind of the application -- "native" or "web"</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>sector_identifier_uri</value>
      <description>URL using the https scheme to be used in calculating 
        Pseudonymous Identifiers by the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>subject_type</value>
      <description>subject_type requested for responses to this Client -- 
        "pairwise" or "public"</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>id_token_signed_response_alg</value>
      <description>JWS alg algorithm REQUIRED for signing the ID Token issued 
        to this Client</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>id_token_encrypted_response_alg</value>
      <description>JWE alg algorithm REQUIRED for encrypting the ID Token 
        issued to this Client</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>id_token_encrypted_response_enc</value>
      <description>JWE enc algorithm REQUIRED for encrypting the ID Token 
        issued to this Client</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>userinfo_signed_response_alg</value>
      <description>JWS alg algorithm REQUIRED for signing UserInfo Responses</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>userinfo_encrypted_response_alg</value>
      <description>JWE alg algorithm REQUIRED for encrypting UserInfo Responses</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>userinfo_encrypted_response_enc</value>
      <description>JWE enc algorithm REQUIRED for encrypting UserInfo Responses</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>request_object_signing_alg</value>
      <description>JWS alg algorithm that MUST be used for signing Request 
        Objects sent to the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>request_object_encryption_alg</value>
      <description>JWE alg algorithm the RP is declaring that it may use for 
        encrypting Request Objects sent to the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>request_object_encryption_enc</value>
      <description>JWE enc algorithm the RP is declaring that it may use for 
        encrypting Request Objects sent to the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>token_endpoint_auth_signing_alg</value>
      <description>JWS alg algorithm that MUST be used for signing the JWT 
        used to authenticate the Client at the Token Endpoint for the 
        private_key_jwt and client_secret_jwt authentication methods</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>default_max_age</value>
      <description>Default Maximum Authentication Age</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>require_auth_time</value>
      <description>Boolean value specifying whether the auth_time Claim in the 
        ID Token is REQUIRED</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>default_acr_values</value>
      <description>Default requested Authentication Context Class Reference values</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>initiate_login_uri</value>
      <description>URI using the https scheme that a third party can use to 
        initiate a login by the RP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2015-12-03">
      <value>request_uris</value>
      <description>Array of request_uri values that are pre-registered by the 
        RP for use at the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-registration-1_0-29.html#IANA">OpenID Connect Dynamic Client Registration 1.0 incorporating errata set 2</xref>
    </record>
    <record date="2018-02-01">
      <value>claims_redirect_uris</value>
      <description>claims redirection endpoints</description>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html#as-config">UMA 2.0 Grant for OAuth 2.0, Section 2</xref>
    </record>
    <record date="2019-07-22" updated="2020-01-29">
      <value>nfv_token_signed_response_alg</value>
      <description>JWS alg algorithm required for signing the nfv Token issued to this Client</description>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2019-07-22" updated="2020-01-29">
      <value>nfv_token_encrypted_response_alg</value>
      <description>JWE alg algorithm required for encrypting the nfv Token issued to this Client</description>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2019-07-22" updated="2020-01-29">
      <value>nfv_token_encrypted_response_enc</value>
      <description>JWE enc algorithm required for encrypting the nfv Token issued to this Client</description>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_certificate_bound_access_tokens</value>
      <description>Indicates the client's intention to
        use mutual-TLS client certificate-bound access tokens.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 3.4</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_auth_subject_dn</value>
      <description>String value specifying the expected
        subject DN of the client certificate.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.1.2</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_auth_san_dns</value>
      <description>String value specifying the expected
        dNSName SAN entry in the client certificate.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.1.2</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_auth_san_uri</value>
      <description>String value specifying the expected
        uniformResourceIdentifier SAN entry in the client certificate.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.1.2</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_auth_san_ip</value>
      <description>String value specifying the expected
        iPAddress SAN entry in the client certificate.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.1.2</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_auth_san_email</value>
      <description>String value specifying the expected
        rfc822Name SAN entry in the client certificate.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.1.2</xref>
    </record>
    <record date="2020-09-08">
      <value>require_signed_request_object</value>
      <description>Indicates where authorization request needs
        to be protected as Request Object and provided through either
        request or request_uri parameter.</description>
      <controller><xref type="person" data="IETF"/></controller>
      <xref type="rfc" data="rfc9101">RFC9101, Section 10.5</xref>
    </record>
    <record date="2021-07-30">
      <value>require_pushed_authorization_requests</value>
      <description>Indicates whether the client is required to use PAR to initiate authorization requests.</description>
      <controller><xref type="person" data="IESG"/></controller>
      <xref type="rfc" data="rfc9126">RFC9126, Section 6</xref>
    </record>
    <record date="2021-09-07">
      <value>introspection_signed_response_alg</value>
      <description>String value indicating the client’s
desired introspection response signing algorithm</description>
      <controller><xref type="person" data="IETF"/></controller>
      <xref type="rfc" data="rfc9701">RFC9701, Section 6</xref>
    </record>
    <record date="2021-09-07">
      <value>introspection_encrypted_response_alg</value>
      <description>String value specifying the desired
introspection response content key encryption algorithm (alg
value)</description>
      <controller><xref type="person" data="IETF"/></controller>
      <xref type="rfc" data="rfc9701">RFC9701, Section 6</xref>
    </record>
    <record date="2021-09-07">
      <value>introspection_encrypted_response_enc</value>
      <description>String value specifying the desired
introspection response content encryption algorithm (enc value)</description>
      <controller><xref type="person" data="IETF"/></controller>
      <xref type="rfc" data="rfc9701">RFC9701, Section 6</xref>
    </record>
    <record date="2022-09-19">
      <value>frontchannel_logout_uri</value>
      <description>RP URL that will cause the RP to log itself out when 
        rendered in an iframe by the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-frontchannel-1_0.html#RPLogout">OpenID Connect Front-Channel Logout 1.0, Section 2</xref>
    </record>
    <record date="2022-09-19">
      <value>frontchannel_logout_session_required</value>
      <description>Boolean value specifying whether the RP requires that 
        a sid (session ID) query parameter be included to identify the RP 
        session with the OP when the frontchannel_logout_uri is used</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-frontchannel-1_0.html#RPLogout">OpenID Connect Front-Channel Logout 1.0, Section 2</xref>
    </record>
    <record date="2022-09-19">
      <value>backchannel_logout_uri</value>
      <description>RP URL that will cause the RP to log itself out when 
        sent a Logout Token by the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-backchannel-1_0.html#BCRegistration">OpenID Connect Back-Channel Logout 1.0, Section 2.2</xref>
    </record>
    <record date="2022-09-19">
      <value>backchannel_logout_session_required</value>
      <description>Boolean value specifying whether the RP requires that a sid 
        (session ID) Claim be included in the Logout Token to identify the RP 
        session with the OP when the backchannel_logout_uri is used</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-backchannel-1_0.html#BCRegistration">OpenID Connect Back-Channel Logout 1.0, Section 2.2</xref>
    </record>
    <record date="2022-09-19">
      <value>post_logout_redirect_uris</value>
      <description>Array of URLs supplied by the RP to which it MAY request that 
        the End-User's User Agent be redirected using the post_logout_redirect_uri 
        parameter after a logout has been performed</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-rpinitiated-1_0.html#ClientMetadata">OpenID Connect RP-Initiated Logout 1.0, Section 3.1</xref>
    </record>
    <record date="2023-01-04">
      <value>authorization_details_types</value>
      <description>Indicates what authorization details types the client uses.</description>
      <controller><xref type="person" data="IETF"/></controller>
      <xref type="rfc" data="rfc9396">RFC9396, Section 10</xref>
    </record>
    <record date="2023-05-01">
      <value>dpop_bound_access_tokens</value>
      <description>Boolean value specifying whether the client always uses DPoP for token requests</description>
      <controller><xref type="person" data="IETF"/></controller>
      <xref type="rfc" data="rfc9449">RFC9449, Section 5.2</xref>
    </record>
    <record date="2024-08-08">
      <value>client_registration_types</value>
      <description>An array of strings specifying the client registration types the RP wants to use</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#RP_metadata">Section 5.1.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-08">
      <value>signed_jwks_uri</value>
      <description>URL referencing a signed JWT having the client's JWK Set document as its payload</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#jwks_metadata">Section 5.2.1 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-08">
      <value>organization_name</value>
      <description>Human-readable name representing the organization owning this client</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-13">
      <value>description</value>
      <description>Human-readable brief description of this client presentable to the End-User</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-13">
      <value>keywords</value>
      <description>JSON array with one or more strings representing search keywords, tags, categories, or labels that apply to this client</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-13">
      <value>information_uri</value>
      <description>URL for documentation of additional information about this client viewable by the End-User</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-13">
      <value>organization_uri</value>
      <description>URL of a Web page for the organization owning this client</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2025-04-28" updated="2026-02-13">
      <value>use_mtls_endpoint_aliases</value>
      <description>Boolean value indicating the requirement for a client
to use mutual-TLS endpoint aliases <xref type="rfc" data="rfc8705">RFC8705</xref> declared by the authorization 
server in its metadata even beyond the Mutual-TLS Client Authentication and 
Certificate-Bound Access Tokens use cases.</description>
      <controller><xref type="person" data="OpenID_Foundation_FAPI_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/fapi-security-profile-2_0.html#client-metadata">Section 5.2.2.1.1 of FAPI 2.0 Security Profile</xref>
    </record>
    <record date="2025-08-04">
      <value>encrypted_response_enc_values_supported</value>
      <description>Non-empty array of strings, where each string is a JWE <xref type="rfc" data="rfc7516"/> enc algorithm that can be used as the content encryption algorithm for encrypting the Response</description>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#new_parameters">Section 5.1 of OpenID for Verifiable Presentations 1.0</xref>
    </record>
    <record date="2025-08-04">
      <value>vp_formats_supported</value>
      <description>An object containing a list of name/value pairs, where the name is a string identifying a Credential format supported by the Verifier</description>
      <controller><xref type="person" data="OpenID_Foundation_Digital_Credentials_Protocols_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#client_metadata_parameters">Section 11.1 of OpenID for Verifiable Presentations 1.0</xref>
    </record>
  </registry>

  <registry id="token-endpoint-auth-method">
    <title>OAuth Token Endpoint Authentication Methods</title>
    <xref type="rfc" data="rfc7591"/>
    <xref type="rfc" data="rfc8414"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Justin Richer</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc7591"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record date="2015-05-12">
      <value>none</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_secret_post</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-05-12">
      <value>client_secret_basic</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7591"/>
    </record>
    <record date="2015-12-03">
      <value>client_secret_jwt</value>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2015-12-03">
      <value>private_key_jwt</value>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="http://openid.net/specs/openid-connect-core-1_0.html">OpenID Connect Core 1.0 incorporating errata set 1</xref>
    </record>
    <record date="2019-09-13">
      <value>tls_client_auth</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.1.1</xref>
    </record>
    <record date="2019-09-13">
      <value>self_signed_tls_client_auth</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 2.2.1</xref>
    </record>
  </registry>

  <registry id="pkce-code-challenge-method">
    <title>PKCE Code Challenge Methods</title>
    <xref type="rfc" data="rfc7636"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>John Bradley, Mike Jones</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc7636"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record date="2015-05-12">
      <value>plain</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7636">Section 4.2 of RFC7636</xref>
    </record>
    <record date="2015-05-12">
      <value>S256</value>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7636">Section 4.2 of RFC7636</xref>
    </record>
  </registry>

  <registry id="token-introspection-response">
    <title>OAuth Token Introspection Response</title>
    <xref type="rfc" data="rfc7662"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Justin Richer</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc7662"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record date="2015-08-13">
      <value>active</value>
      <description>Token active status</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>username</value>
      <description>User identifier of the resource owner</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>client_id</value>
      <description>Client identifier of the client</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>scope</value>
      <description>Authorized scopes of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>token_type</value>
      <description>Type of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>exp</value>
      <description>Expiration timestamp of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>iat</value>
      <description>Issuance timestamp of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>nbf</value>
      <description>Timestamp which the token is not valid before</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>sub</value>
      <description>Subject of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>aud</value>
      <description>Audience of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>iss</value>
      <description>Issuer of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2015-08-13">
      <value>jti</value>
      <description>Unique identifier of the token</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7662">RFC7662, Section 2.2</xref>
    </record>
    <record date="2017-06-22">
      <value>permissions</value>
      <description>array of objects, each describing a scoped, time-limitable permission for a resource</description>
      <controller><xref type="person" data="Kantara_UMA_WG"/></controller>
      <xref type="uri" data="https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-federated-authz-2.0.html#uma-bearer-token-profile">Federated Authorization for UMA 2.0, Section 5.1.1</xref>
    </record>
    <record date="2018-08-23">
      <value>vot</value>
      <description>Vector of Trust value</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8485"/>
    </record>
    <record date="2018-08-23">
      <value>vtm</value>
      <description>Vector of Trust trustmark URL</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8485"/>
    </record>
    <record date="2019-02-05" updated="2019-07-24">
      <value>act</value>
      <description>Actor</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 4.1</xref>
    </record>
    <record date="2019-02-05" updated="2019-07-24">
      <value>may_act</value>
      <description>Authorized Actor - the party that is authorized
        to become the actor</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8693">RFC8693, Section 4.4</xref>
    </record>
    <record date="2019-09-13">
      <value>cnf</value>
      <description>Confirmation</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc7800"/>
      <xref type="rfc" data="rfc8705"/>
    </record>
    <record date="2021-07-27">
      <value>ace_profile</value>
      <description>The ACE profile used between the client and RS.</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Section 5.9.2</xref>
    </record>
    <record date="2021-07-27">
      <value>cnonce</value>
      <description>"client-nonce".  A nonce previously provided to the
        AS by the RS via the client.  Used to verify token freshness when
        the RS cannot synchronize its clock with the AS.</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Section 5.9.2</xref>
    </record>
    <record date="2021-11-26">
      <value>cti</value>
      <description>"CWT ID".  The identifier of a CWT as defined in
        <xref type="rfc" data="rfc8392"/>.</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Section 5.9.2</xref>
    </record>
    <record date="2021-07-27">
      <value>exi</value>
      <description>"Expires in". Lifetime of the token in seconds from 
        the time the RS first sees it. Used to implement a weaker form 
        of token expiration for devices that cannot synchronize their 
        internal clocks.</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9200">RFC9200, Section 5.9.2</xref>
    </record>
    <record date="2023-01-04">
      <value>authorization_details</value>
      <description>The member authorization_details contains a JSON array 
        of JSON objects representing the rights of the access token. Each 
        JSON object contains the data to specify the authorization requirements 
        for a certain type of resource.</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9396">RFC9396, Section 9.2</xref>
    </record>
    <record date="2023-06-29">
      <value>acr</value>
      <description>Authentication Context Class Reference</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9470">RFC9470, Section 6.2</xref>
    </record>
    <record date="2023-06-29">
      <value>auth_time</value>
      <description>Time when the user authentication occurred</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9470">RFC9470, Section 6.2</xref>
    </record>
  </registry>

  <registry id="authorization-server-metadata">
    <title>OAuth Authorization Server Metadata</title>
    <xref type="rfc" data="rfc8414"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Mike Jones, Nat Sakimura, John Bradley, Dick Hardt</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc8414"/>. If approved, designated experts should notify 
IANA within two weeks. For assistance, please contact iana@iana.org. 
IANA does not monitor the list.
    </note>
    <record date="2018-03-27">
      <name>issuer</name>
      <description>Authorization server's issuer identifier URL</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>authorization_endpoint</name>
      <description>URL of the authorization server's authorization endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>token_endpoint</name>
      <description>URL of the authorization server's token endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>jwks_uri</name>
      <description>URL of the authorization server's JWK Set document</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>registration_endpoint</name>
      <description>URL of the authorization server's OAuth 2.0 Dynamic Client Registration Endpoint </description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>scopes_supported</name>
      <description>JSON array containing a list of the OAuth 2.0 "scope" values that this authorization server supports</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>response_types_supported</name>
      <description>JSON array containing a list of the OAuth 2.0 "response_type" values that this authorization server supports</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>response_modes_supported</name>
      <description>JSON array containing a list of the OAuth 2.0 "response_mode" values that this authorization server supports</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>grant_types_supported</name>
      <description>JSON array containing a list of the OAuth 2.0 grant type values that this authorization server supports</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>token_endpoint_auth_methods_supported</name>
      <description>JSON array containing a list of client authentication methods supported by this token endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>token_endpoint_auth_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS signing algorithms supported by the token endpoint for the
        signature on the JWT used to authenticate the client at the token endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>service_documentation</name>
      <description>URL of a page containing human-readable information that developers might want or need to know when using
        the authorization server</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>ui_locales_supported</name>
      <description>Languages and scripts supported for the user interface, represented as a 
        JSON array of language tag values from BCP 47 <xref type="rfc" data="rfc5646"/></description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>op_policy_uri</name>
      <description>URL that the authorization server provides to the person registering the client to read about the
        authorization server's requirements on how the client can use the data provided by the authorization server</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>op_tos_uri</name>
      <description>URL that the authorization server provides to the person registering the client to read about the
        authorization server's terms of service</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>revocation_endpoint</name>
      <description>URL of the authorization server's OAuth 2.0 revocation endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>revocation_endpoint_auth_methods_supported</name>
      <description>JSON array containing a list of client authentication methods supported by this revocation endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>revocation_endpoint_auth_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS signing algorithms supported by the revocation endpoint
        for the signature on the JWT used to authenticate the client at the revocation endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>introspection_endpoint</name>
      <description>URL of the authorization server's OAuth 2.0 introspection endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>introspection_endpoint_auth_methods_supported</name>
      <description>JSON array containing a list of client authentication methods supported by this introspection endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>introspection_endpoint_auth_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS signing algorithms supported by the introspection endpoint for the
        signature on the JWT used to authenticate the client at the introspection endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-03-27">
      <name>code_challenge_methods_supported</name>
      <description>PKCE code challenge methods supported by this authorization server</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2</xref>
    </record>
    <record date="2018-06-27">
      <name>signed_metadata</name>
      <description>Signed JWT containing metadata values about
        the authorization server as claims</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8414">RFC8414, Section 2.1</xref>
    </record>
    <record date="2019-06-03">
      <name>device_authorization_endpoint</name>
      <description>URL of the authorization server's device authorization endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8628">RFC8628, Section 4</xref>
    </record>
    <record date="2019-09-13">
      <name>tls_client_certificate_bound_access_tokens</name>
      <description>Indicates authorization server support for
        mutual-TLS client certificate-bound access tokens.</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 3.3</xref>
    </record>
    <record date="2019-09-13">
      <name>mtls_endpoint_aliases</name>
      <description>JSON object containing alternative
        authorization server endpoints, which a client intending to do
        mutual TLS will use in preference to the conventional endpoints.</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc8705">RFC8705, Section 5</xref>
    </record>
    <record date="2020-01-13">
      <name>nfv_token_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS signing algorithms supported by the
        server for signing the JWT used as NFV Token</description>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2020-01-13">
      <name>nfv_token_encryption_alg_values_supported</name>
      <description>JSON array containing a list of the JWE encryption algorithms (alg values)
        supported by the server to encode the JWT used as NFV Token</description>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2020-01-13">
      <name>nfv_token_encryption_enc_values_supported</name>
      <description>JSON array containing a list of the JWE encryption algorithms (enc values)
        supported by the server to encode the JWT used as NFV Token</description>
      <controller><xref type="person" data="ETSI"/></controller>
      <xref type="uri" data="https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/022/02.07.01_60/gs_NFV-SEC022v020701p.pdf">ETSI GS NFV-SEC 022 V2.7.1</xref>
    </record>
    <record date="2020-04-28">
      <name>userinfo_endpoint</name>
      <description>URL of the OP's UserInfo Endpoint</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>acr_values_supported</name>
      <description>JSON array containing a list of the Authentication Context Class References that this OP supports</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>subject_types_supported</name>
      <description>JSON array containing a list of the Subject Identifier types that this OP supports</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>id_token_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS "alg" values supported by the OP for the ID Token</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>id_token_encryption_alg_values_supported</name>
      <description>JSON array containing a list of the JWE "alg" values supported by the OP for the ID Token</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>id_token_encryption_enc_values_supported</name>
      <description>JSON array containing a list of the JWE "enc" values supported by the OP for the ID Token</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>userinfo_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS "alg" values supported by the UserInfo Endpoint</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>userinfo_encryption_alg_values_supported</name>
      <description>JSON array containing a list of the JWE "alg" values supported by the UserInfo Endpoint</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>userinfo_encryption_enc_values_supported</name>
      <description>JSON array containing a list of the JWE "enc" values supported by the UserInfo Endpoint</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>request_object_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS "alg" values supported by the OP for Request Objects</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>request_object_encryption_alg_values_supported</name>
      <description>JSON array containing a list of the JWE "alg" values supported by the OP for Request Objects</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>request_object_encryption_enc_values_supported</name>
      <description>JSON array containing a list of the JWE "enc" values supported by the OP for Request Objects</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>display_values_supported</name>
      <description>JSON array containing a list of the "display" parameter values that the OpenID Provider supports</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>claim_types_supported</name>
      <description>JSON array containing a list of the Claim Types that the OpenID Provider supports</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>claims_supported</name>
      <description>JSON array containing a list of the Claim Names of the Claims that the OpenID Provider MAY be able to supply values for</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>claims_locales_supported</name>
      <description>Languages and scripts supported for values in Claims being returned, represented as a JSON array of BCP 47 <xref type="rfc" data="rfc5646"/> language tag values</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>claims_parameter_supported</name>
      <description>Boolean value specifying whether the OP supports use of the "claims" parameter</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>request_parameter_supported</name>
      <description>Boolean value specifying whether the OP supports use of the "request" parameter</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>request_uri_parameter_supported</name>
      <description>Boolean value specifying whether the OP supports use of the "request_uri" parameter</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-04-28">
      <name>require_request_uri_registration</name>
      <description>Boolean value specifying whether the OP requires any "request_uri" values used to be pre-registered</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-discovery-1_0-29.html">OpenID Connect Discovery 1.0, Section 3</xref>
    </record>
    <record date="2020-09-08">
      <name>require_signed_request_object</name>
      <description>Indicates where authorization request needs
        to be protected as Request Object and provided through either
        request or request_uri parameter.</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9101">RFC9101, Section 10.5</xref>
    </record>
    <record date="2021-07-30">
      <name>pushed_authorization_request_endpoint</name>
      <description>URL of the authorization server's pushed
        authorization request endpoint</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc9126">RFC9126, Section 5</xref>
    </record>
    <record date="2021-07-30">
      <name>require_pushed_authorization_requests</name>
      <description>Indicates whether the authorization server
        accepts authorization requests only via PAR.</description>
      <controller>IESG</controller>
      <xref type="rfc" data="rfc9126">RFC9126, Section 5</xref>
    </record>
    <record date="2021-09-07">
      <name>introspection_signing_alg_values_supported</name>
      <description>JSON array containing a list of algorithms supported by the authorization server for introspection response signing</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9701">RFC9701, Section 7</xref>
    </record>
    <record date="2021-09-07">
      <name>introspection_encryption_alg_values_supported</name>
      <description>JSON array containing a list of algorithms
        supported by the authorization server for introspection response
        content key encryption (alg value)</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9701">RFC9701, Section 7</xref>
    </record>
    <record date="2021-09-07">
      <name>introspection_encryption_enc_values_supported</name>
      <description>JSON array containing a list of algorithms
        supported by the authorization server for introspection response
        content encryption (enc value)</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9701">RFC9701, Section 7</xref>
    </record>
    <record date="2022-01-06" updated="2022-03-17">
      <name>authorization_response_iss_parameter_supported</name>
      <description>Boolean value indicating whether the 
        authorization server provides the iss parameter in the 
        authorization response.
      </description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9207">RFC9207, Section 3</xref>
    </record>
    <record date="2022-09-23">
      <name>check_session_iframe</name>
      <description>URL of an OP iframe that supports cross-origin communications for session state information with the RP Client, using the HTML5 postMessage API</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-session-1_0.html#OPMetadata">OpenID Connect Session Management 1.0, Section 3.3</xref>
    </record>
    <record date="2022-09-23">
      <name>frontchannel_logout_supported</name>
      <description>Boolean value specifying whether the OP supports HTTP-based logout, with true indicating support</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-frontchannel-1_0.html#OPLogout">OpenID Connect Front-Channel Logout 1.0, Section 3</xref>
    </record>
    <record date="2022-09-23">
      <name>backchannel_logout_supported</name>
      <description>Boolean value specifying whether the OP supports back-channel logout, with true indicating support</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-backchannel-1_0.html#Backchannel">OpenID Connect Back-Channel Logout 1.0, Section 2</xref>
    </record>
    <record date="2022-09-23">
      <name>backchannel_logout_session_supported</name>
      <description>Boolean value specifying whether the OP can pass a sid (session ID) Claim in the Logout Token to identify the RP session with the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-backchannel-1_0.html#Backchannel">OpenID Connect Back-Channel Logout 1.0, Section 2</xref>
    </record>
    <record date="2022-09-23">
      <name>end_session_endpoint</name>
      <description>URL at the OP to which an RP can perform a redirect to request that the End-User be logged out at the OP</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-connect-rpinitiated-1_0.html#OPMetadata">OpenID Connect RP-Initiated Logout 1.0, Section 2.1</xref>
    </record>
    <record date="2022-12-01">
      <name>backchannel_token_delivery_modes_supported</name>
      <description>Supported CIBA authentication result delivery modes</description>
      <controller><xref type="person" data="OpenID_Foundation_MODRNA_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html#registration">OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4</xref>
    </record>
    <record date="2022-12-01">
      <name>backchannel_authentication_endpoint</name>
      <description>CIBA Backchannel Authentication Endpoint</description>
      <controller><xref type="person" data="OpenID_Foundation_MODRNA_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html#registration">OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4</xref>
    </record>
    <record date="2022-12-01">
      <name>backchannel_authentication_request_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS signing algorithms supported for validation of signed CIBA authentication requests</description>
      <controller><xref type="person" data="OpenID_Foundation_MODRNA_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html#registration">OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4</xref>
    </record>
    <record date="2022-12-01">
      <name>backchannel_user_code_parameter_supported</name>
      <description>Indicates whether the OP supports the use of the CIBA user_code parameter.</description>
      <controller><xref type="person" data="OpenID_Foundation_MODRNA_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html#registration">OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4</xref>
    </record>
    <record date="2023-01-04">
      <name>authorization_details_types_supported</name>
      <description>JSON array containing the authorization details types the AS supports</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9396">RFC9396, Section 10</xref>
    </record>
    <record date="2023-05-01">
      <name>dpop_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS algorithms supported for DPoP proof JWTs</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9449">RFC9449, Section 5.1</xref>
    </record>
    <record date="2024-08-26">
      <name>client_registration_types_supported</name>
      <description>Client Registration Types Supported</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.1.3 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-26">
      <name>federation_registration_endpoint</name>
      <description>Federation Registration Endpoint</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.1.3 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-26">
      <name>signed_jwks_uri</name>
      <description>URL referencing a signed JWT having this authorization server's JWK Set document as its payload</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.1 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-26">
      <name>jwks</name>
      <description>JSON Web Key Set document, passed by value</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.1 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-26">
      <name>organization_name</name>
      <description>Human-readable name representing the organization owning this authorization server</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-03">
      <name>display_name</name>
      <description>Human-readable name of the authorization server to be presented to the End-User</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-03">
      <name>description</name>
      <description>Human-readable brief description of this authorization server presentable to the End-User</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-03">
      <name>keywords</name>
      <description>JSON array with one or more strings representing search keywords, 
        tags, categories, or labels that apply to this authorization server</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-26">
      <name>contacts</name>
      <description>Array of strings representing ways to contact people responsible for this authorization server, typically email addresses</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-08-26">
      <name>logo_uri</name>
      <description>URL that references a logo for the organization owning this authorization server</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-03">
      <name>information_uri</name>
      <description>URL for documentation of additional information about this authorization server viewable by the End-User</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-03">
      <name>organization_uri</name>
      <description>URL of a Web page for the organization owning this authorization server</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#name-oauth-authorization-server-">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2024-10-22">
      <name>protected_resources</name>
      <description>JSON array containing a list of resource identifiers for OAuth protected resources</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 4</xref>
    </record>
  </registry>
  
  <registry id="protected-resource-metadata">
    <title>OAuth Protected Resource Metadata</title>
    <xref type="rfc" data="rfc9728"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Michael Jones, Dick Hardt</expert>
    <note>Registration requests should be sent to <xref type="uri" data="mailto:oauth-ext-review@ietf.org">oauth-ext-review@ietf.org</xref>, as 
described in <xref type="rfc" data="rfc9728"/>. If approved, 
designated experts should notify IANA within two weeks. For 
assistance, please contact iana@iana.org. IANA does not monitor the 
list.
    </note>
    <record date="2024-10-22">
      <name>resource</name>
      <description>Protected resource's resource identifier URL</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>authorization_servers</name>
      <description>JSON array containing a list of OAuth authorization server issuer identifiers</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>jwks_uri</name>
      <description>URL of the protected resource's JWK Set document</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>scopes_supported</name>
      <description>JSON array containing a list of the OAuth 2.0 scope values that are used in authorization requests to request access to this protected resource</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>bearer_methods_supported</name>
      <description>JSON array containing a list of the OAuth 2.0 bearer token presentation methods that this protected resource supports</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>resource_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS signing algorithms (alg values) supported by the protected resource for signed content</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>resource_name</name>
      <description>Human-readable name of the protected resource</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>resource_documentation</name>
      <description>URL of a page containing human-readable information that developers might want or need to know when using the protected resource</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>resource_policy_uri</name>
      <description>URL of a page containing human-readable information about the protected resource's requirements on how the client can use the data provided by the protected resource</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>resource_tos_uri</name>
      <description>URL of a page containing human-readable information about the protected resource's terms of service</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>tls_client_certificate_bound_access_tokens</name>
      <description>Boolean value indicating protected resource support for mutual-TLS client certificate-bound access tokens</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>authorization_details_types_supported</name>
      <description>JSON array containing a list of the authorization details type values supported by the resource server when the authorization_details request parameter is used</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>dpop_signing_alg_values_supported</name>
      <description>JSON array containing a list of the JWS alg values supported by the resource server for validating DPoP proof JWTs</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>dpop_bound_access_tokens_required</name>
      <description>Boolean value specifying whether the protected resource always requires the use of DPoP-bound access tokens</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2</xref>
    </record>
    <record date="2024-10-22">
      <name>signed_metadata</name>
      <description>Signed JWT containing metadata parameters about the protected resource as claims</description>
      <controller>IETF</controller>
      <xref type="rfc" data="rfc9728">RFC9728, Section 2.2</xref>
    </record>
    <record date="2026-02-04">
      <name>signed_jwks_uri</name>
      <description>URL referencing a signed JWT having the protected resource's JWK Set document as its payload</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#jwks_metadata">Section 5.2.1 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>jwks</name>
      <description>JSON Web Key Set document, passed by value</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#jwks_metadata">Section 5.2.1 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>organization_name</name>
      <description>Human-readable name representing the organization owning this protected resource</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>description</name>
      <description>Human-readable brief description of this protected resource presentable to the End-User</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>keywords</name>
      <description>JSON array with one or more strings representing search keywords, tags, categories, 
        or labels that apply to this protected resource</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>contacts</name>
      <description>Array of strings representing ways to contact people responsible for this 
        protected resource, typically email addresses</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>logo_uri</name>
      <description>URL that references a logo for the organization owning this protected resource</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
    <record date="2026-02-04">
      <name>organization_uri</name>
      <description>URL of a Web page for the organization owning this protected resource</description>
      <controller><xref type="person" data="OpenID_Foundation_Artifact_Binding_WG"/></controller>
      <xref type="uri" data="https://openid.net/specs/openid-federation-1_0.html#informational_metadata">Section 5.2.2 of OpenID Federation 1.0</xref>
    </record>
  </registry>


  <people>
    <person id="ETSI">
      <name>ETSI</name>
      <uri>mailto:pnns&amp;etsi.org</uri>
      <updated>2019-07-22</updated>
    </person>
    <person id="IESG">
      <name>Internet Engineering Steering Group</name>
      <uri>mailto:iesg&amp;ietf.org</uri>
    </person>
    <person id="IETF">
      <name>Internet Engineering Task Force</name>
      <uri>mailto:ietf&amp;ietf.org</uri>
    </person>
    <person id="Kantara_UMA_WG">
      <name>Kantara Initiative User-Managed Access Work Group</name>
      <uri>mailto:staff&amp;kantarainitiative.org</uri>
      <updated>2018-04-23</updated>
    </person>
    <person id="OpenID_Foundation_Artifact_Binding_WG">
      <name>OpenID Foundation Artifact Binding Working Group</name>
      <uri>mailto:openid-specs-ab&amp;lists.openid.net</uri>
      <updated>2022-09-23</updated>
    </person>
    <person id="OpenID_Foundation_Digital_Credentials_Protocols_WG">
      <name>OpenID Foundation Digital Credentials Protocols Working Group</name>
      <uri>mailto:openid-specs-digital-credentials-protocols&amp;lists.openid.net</uri>
      <updated>2025-10-03</updated>
    </person>
    <person id="OpenID_Foundation_FAPI_WG">
      <name>OpenID Foundation FAPI Working Group</name>
      <uri>mailto:openid-specs-fapi&amp;lists.openid.net</uri>
      <updated>2025-04-28</updated>
    </person>
    <person id="OpenID_Foundation_MODRNA_WG">
      <name>OpenID Foundation MODRNA Working Group</name>
      <uri>mailto:openid-specs-mobile-profile&amp;lists.openid.net</uri>
      <updated>2022-12-01</updated>
    </person>
  </people>
</registry>
