diff --git a/docs/en/remote-flow.rst b/docs/en/remote-flow.rst index 05bd578a..d6b59809 100644 --- a/docs/en/remote-flow.rst +++ b/docs/en/remote-flow.rst @@ -510,7 +510,7 @@ The process begins with the RP requesting specific Credentials from the Holder. Upon receiving the Credentials, the Relying Party evaluates their validity and value based on its internal policies. This evaluation considers the current status of the Credential (e.g., active, suspended, revoked) and the specific use case for which the Credential is being presented. -Relying Partys should develop comprehensive internal policies that outline how different types of Credentials are to be evaluated. These policies should address scenarios where a Credential may be partially valid or have limited applicability. Flexibility in evaluation processes is important to accommodate various use cases. For instance, a Credential that is suspended for driving purposes might still be acceptable for age verification. +Relying Parties should develop comprehensive internal policies that outline how different types of Credentials are to be evaluated. These policies should address scenarios where a Credential may be partially valid or have limited applicability. Flexibility in evaluation processes is important to accommodate various use cases. For instance, a Credential that is suspended for driving purposes might still be acceptable for age verification. Authorization Response Errors ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~