…itation 100. Id. at 280-81. Back to Citation 101. https://tools.ietf.org/html/rfc6749 . Back to Citation 102. https://www.hl7.org/FHIR/safety.html . Back to Citation 103. https://tools.ietf.org/html/rfc7591 . Back to Citation 104. https://tools.ietf.org/html/rfc5246 . Bac…
…rization is enabled (which is not recommended for public clients according to [ RFC6749 ] ), the attack can be performed even without user interaction. ¶ If the attacker impersonates a public client, the attacker can exchange the code for tokens at the respective token endpoint. …
…, native mobile application).” See IETF RFC 6749: https://tools.ietf.org/html/rfc6749 . Back to Citation 159. See § 170.315(g)(10)(v)(A)( 1 )( ii ), ( iii ), and ( 2 )( ii ) in 85 FR 70083 . Back to Citation 160. https://www.healthit.gov/buzz-blog/healthit-certification/shin…
…, native mobile application).” See IETF RFC 6749: https://tools.ietf.org/html/rfc6749 . Back to Citation 159. See § 170.315(g)(10)(v)(A)( 1 )( ii ), ( iii ), and ( 2 )( ii ) in 85 FR 70083 . Back to Citation 160. https://www.healthit.gov/buzz-blog/healthit-certification/shin…
…2.1-508.pdf . Back to Citation 14. IETF RFC 6749: https://tools.ietf.org/html/rfc6749 . Back to Citation 15. RFC 6749 ( https://tools.ietf.org/html/rfc6749 ) describes native applications as “clients installed and executed on the device used by the resource owner ( i.e., desk…
…itation 100. Id. at 280-81. Back to Citation 101. https://tools.ietf.org/html/rfc6749 . Back to Citation 102. https://www.hl7.org/FHIR/safety.html . Back to Citation 103. https://tools.ietf.org/html/rfc7591 . Back to Citation 104. https://tools.ietf.org/html/rfc5246 . Bac…
…t-to-payer-api . Back to Citation 481. https://datatracker.ietf.org/doc/html/rfc6749 . Back to Citation 482. https://hl7.org/fhir/us/davinci-hrex/STU1.1/security.html . Back to Citation 483. For more information, see https://www.cms.gov/priorities/key-initiatives/burde…
…e PSD2 PSD3 punycode refugee regulations relationship response_type RFC RFC3986 RFC6749 RFC6750 rp saml SBT SCIM scope scopes seasons greeting security Sef-issued identity Self Issued Identity Self Issued IdP Self-issued OP Self-sovereign Identity Shared Signals Siciliano signatu…
…ain cleartext personal information. Access Tokens An access token (e.g., OAuth [RFC6749] ) is used to allow an application to access a set of services on a subscriber’s behalf following an authentication event. The RP SHALL NOT interpret the presence of an access token as an indi…
…’s common flows (implicit, password, application and access code) as defined in RFC6749, and OpenID Connect Discovery. 9.5. Features Recommendation 17 /rec/oas30/f-key-properties The schema for the Response Objects of the HTTP GET operation for features SHOULD include key feature…
…on Request, servers supporting backwards compatibility revert to the OAuth 2.0 [RFC6749] protocol without this extension. As the OAuth 2.0 [RFC6749] server responses are unchanged by this specification, client implementations of this specification do not need to know if the serve…
…on Request, servers supporting backwards compatibility revert to the OAuth 2.0 [RFC6749] protocol without this extension. As the OAuth 2.0 [RFC6749] server responses are unchanged by this specification, client implementations of this specification do not need to know if the serve…