Table of Contents - X.1285 (05/2025) - OpenID Connect Core 1.0 - Errata Set 2

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
7 ID Token
8 Authentication
8.1 Authentication using the Authorization Code Flow
8.2 Authentication using the Implicit Flow
8.3 Authentication using the Hybrid Flow
9 Initiating Login from a Third Party
10 Claims
10.1 Standard Claims
10.2 Claims languages and scripts
10.3 UserInfo Endpoint
10.4 Requesting Claims using Scope Values
10.5 Requesting Claims using the "claims" Request Parameter
10.6 Claim Types
10.7 Claim Stability and Uniqueness
11 Passing Request Parameters as JWTs
11.1 Passing a Request Object by Value
11.2 Passing a Request Object by Reference
11.3 Validating JWT-Based Requests
12 Self-Issued OpenID Provider
12.1 Self-Issued OpenID Provider Discovery
12.2 Self-Issued OpenID Provider Registration
12.3 Self-Issued OpenID Provider Request
12.4 Self-Issued OpenID Provider Response
12.5 Self-Issued ID Token Validation
13 Subject Identifier Types
13.1 Pairwise Identifier Algorithm
14 Client Authentication
15 Signatures and Encryption
15.1 Signing
Page
15.2 Encryption
16 Offline Access
17 Using Refresh Tokens
17.1 Refresh Request
17.2 Successful Refresh Response
17.3 Refresh Error Response
18 Serializations
18.1 Query String Serialization
18.2 Form Serialization
18.3 JSON Serialization
19 String Operations
20 Implementation Considerations
20.1 Mandatory to Implement Features for All OpenID Providers
20.2 Mandatory to Implement Features for Dynamic OpenID Providers
20.3 Discovery and Registration
20.4 Mandatory to Implement Features for Relying Parties
20.5 Implementation notes
20.6 Compatibility notes
20.7 Related specifications and implementer's guides
21 Security considerations
21.1 Request disclosure
21.2 Server masquerading
21.3 Token manufacture/modification
21.4 Access Token disclosure
21.5 Server response disclosure
21.6 Server response repudiation
21.7 Request repudiation
21.8 Access Token redirect
21.9 Token reuse
21.10 Eavesdropping or leaking Authorization Codes (secondary Authenticator capture)
21.11 Token substitution
21.12 Timing attack
21.13 Other crypto related attacks
21.14 Signing and encryption order
21.15 Issuer identifier
21.16 Implicit flow threats
21.17 TLS requirements
21.18 Lifetimes of Access Tokens and Refresh Tokens
Page
21.19 Symmetric key entropy
21.20 Need for signed requests
21.21 Need for encrypted requests
21.22 HTTP 307 redirects
21.23 Custom URI schemes on iOS
22 Privacy considerations
22.1 Personally Identifiable Information
22.2 Data access monitoring
22.3 Correlation
22.4 Offline access
23 IANA considerations
23.1 JSON Web Token Claims Registration
23.2 OAuth parameters registration
23.3 OAuth extensions error registration
23.4 URI scheme registration
Appendix I – Authorization examples
I.1 Example using response_type=code
I.2 Example using response_type=id_token
I.3 Example using response_type=id_token token
I.4 Example using response_type=code id_token
I.5 Example using response_type=code token
I.6 Example using response_type=code id_token token
I.7 RSA key used in examples
Bibliography