@@ -361,7 +361,7 @@ the verifying party MUST follow OpenID Connect Discovery 1.0 [[!OIDC-DISCOVERY]]
361361
362362When a Client performs an unauthenticated request to a protected resource,
363363the Resource Server MUST respond with the HTTP <code> 401</code> status code,
364- and a <code> WWW-Authenticate</code> HTTP header. See also: [[RFC9110##name-www-authenticate]]
364+ and a <code> WWW-Authenticate</code> HTTP header. See also: [[RFC9110]] (11.6.1. WWW-Authenticate)
365365
366366The <code> WWW-Authenticate</code> HTTP header MUST include an <code> as_uri</code>
367367parameter unless the authentication scheme requires a different mechanism
@@ -427,7 +427,7 @@ Considerations in context of the Solid Protocol [[!SOLID-PROTOCOL]].
427427
428428## TLS Requirements ## {#security-tls}
429429
430- All TLS requirements outlined in [[BCP195] (https://tools.ietf.org/html/bcp195) ] apply to this
430+ All TLS requirements outlined in [[BCP195]] apply to this
431431specification.
432432
433433All tokens, Client, and User credentials MUST only be transmitted over TLS.
@@ -637,6 +637,11 @@ The JSON-LD context is defined as:
637637 "href": "https://docs.kantarainitiative.org/uma/wg/rec-oauth-uma-grant-2.0.html",
638638 "title": "User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization",
639639 "publisher": "Kantara Initiative, Inc"
640+ },
641+ "BCP195": {
642+ "href": "https://www.rfc-editor.org/info/bcp195",
643+ "title": "Best Current Practice 195",
644+ "publisher": "IETF"
640645 }
641646}
642647</pre>
0 commit comments