Abstract
This document is a non-normative set of auxiliary material produced by the User-Managed Access Work Group. It provides advice to, and discussions relevant to, developers and deployers of UMA-enabled software systems, services, and applications.
...
This would mean that the AS would fail the client with an invalid_scope
error at the token endpoint if the client requested it (and presumably pre-registered for it). The RS, too, would receive an invalid_scope
error if it tried to request a permission it hadn't first registered as part of a resource.
...
Anchor | ||||
---|---|---|---|---|
|
...
Although authorization assessment is an internal process performed by the authorization server, in UMA V2.0 it gains a large degree of normative precision. This section explains, using symbolic set math. (tbs – NEEDS REVIEW)
...