@@ -902,7 +902,8 @@ specific security measures, as described in the respective sections.
902902However, in some cases, these measures are not sufficient or are not
903903implemented correctly. Authorization servers therefore SHOULD ensure that
904904access tokens are sender-constrained and audience-restricted as described
905- in the following.
905+ in the following. Architecture and performance reasons may
906+ prevent the use of these measures in some deployments.
906907
907908
908909### Sender-Constrained Access Tokens {#pop_tokens}
@@ -1451,8 +1452,8 @@ inadvertently be sent to malicious origins or injected from malicious origins.
14511452
14521453### Examples
14531454
1454- The following JavaScript examples of attacks using in-browser communication are
1455- described in [ @research .rub] :
1455+ The following non-normative pseudocode examples of attacks using in-browser
1456+ communication are described in [ @research .rub] :
14561457
14571458#### Insufficient Limitation of Receiver Origins
14581459
@@ -1512,7 +1513,7 @@ generally required.
15121513When comparing client receiver origins against pre-registered origins,
15131514authorization servers MUST utilize exact string matching as described in
15141515(#iuv_countermeasures). Authorization servers MUST send postMessages to
1515- trusted client receiver origins:
1516+ trusted client receiver origins, as shown in the following, non-normative example :
15161517
15171518```
15181519window.opener.postMessage(
@@ -1532,7 +1533,7 @@ access tokens (see (#insufficient_uri_validation)).
15321533Clients MUST prevent injection of in-browser messages on the client
15331534receiver endpoint. Clients MUST utilize exact string matching to compare
15341535the initiator origin of an in-browser message with the authorization
1535- server origin:
1536+ server origin, as shown in the following, non-normative example :
15361537
15371538```
15381539window.addEventListener("message", (e) => {
0 commit comments