<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type='text/xsl' href='http://xml2rfc.tools.ietf.org/authoring/rfc2629.xslt' ?>
<!DOCTYPE rfc PUBLIC "-//IETF//DTD RFC 2629//EN"
"http://xml2rfc.tools.ietf.org/authoring/rfc2629.dtd">
<!--
  NOTE:  This XML file is input used to produce the authoritative copy of an
  OpenID Foundation specification.  The authoritative copy is the HTML output.
  This XML source file is not authoritative.  The statement ipr="none" is
  present only to satisfy the document compilation tool and is not indicative
  of the IPR status of this specification.  The IPR for this specification is
  described in the "Notices" section.  This is a public OpenID Foundation
  document and not a private document, as the private="..." declaration could
  be taken to indicate.
-->
<rfc category="std" docName="openid-connect-rp-metadata-choices-1_0" ipr="none"
     submissionType="IETF" consensus="yes"
     xmlns:xi="http://www.w3.org/2001/XInclude">

  <?rfc toc="yes" ?>
  <?rfc tocdepth="5" ?>
  <?rfc symrefs="yes" ?>
  <?rfc sortrefs="yes"?>
  <?rfc strict="yes" ?>
  <?rfc iprnotified="no" ?>
  <?rfc private="Draft" ?>

  <front>
    <title abbrev="OpenID Connect RP Metadata Choices">OpenID Connect
    Relying Party Metadata Choices 1.0 - draft 05</title>

    <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
      <organization abbrev="Self-Issued Consulting">Self-Issued Consulting</organization>
      <address>
        <email>michael_b_jones@hotmail.com</email>
	<uri>https://self-issued.info/</uri>
      </address>
    </author>

    <author fullname="Roland Hedberg" initials="R." surname="Hedberg">
      <organization>independent</organization>
      <address>
        <email>roland@catalogix.se</email>
      </address>
    </author>

    <author fullname="John Bradley" initials="J." surname="Bradley">
      <organization abbrev="Yubico">Yubico</organization>
      <address>
        <email>ve7jtb@ve7jtb.com</email>
        <uri>https://www.linkedin.com/in/ve7jtb/</uri>
      </address>
    </author>

    <author fullname="Filip Skokan" initials="F." surname="Skokan">
      <organization>Okta</organization>
      <address>
        <email>panva.ip@gmail.com</email>
      </address>
    </author>

    <date day="12" month="March" year="2026" />

    <workgroup>OpenID Connect Working Group</workgroup>

    <abstract>
      <t>OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0
      protocol. It enables Clients to verify the identity of the End-User based
      on the authentication performed by an Authorization Server, as well as to
      obtain basic profile information about the End-User in an interoperable and
      REST-like manner.</t>

      <t>
	This specification extends the OpenID Connect Dynamic Client Registration 1.0
	specification to enable RPs to express a set of supported values
	for some RP metadata parameters, rather than just single values.
	This functionality is particularly useful when Automatic Registration,
	as defined in OpenID Federation 1.0,
	is used, since there is no registration response from the OP
	to tell the RP what choices were made by the OP.
	This gives the OP the information that it needs to make choices about
	how to interact with the RP in ways that work for both parties.
      </t>
    </abstract>
  </front>

  <middle>
    <section anchor="Introduction" title="Introduction">

      <t>
	OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0
	<xref target="RFC6749"/>
	protocol. It enables Clients to verify the identity of the End-User based
	on the authentication performed by an Authorization Server, as well as to
	obtain basic profile information about the End-User in an interoperable and
	REST-like manner.
      </t>
      <t>
	In order for an OpenID Connect Relying Party to utilize OpenID Connect services for
	an End-User, the RP needs to register with the OpenID Provider
	to provide the OP information about itself.
	This specification extends the OpenID Connect Dynamic Client Registration 1.0
	specification <xref target="OpenID.Registration"/>
	to enable RPs to express a set of supported values
	for some RP metadata parameters, rather than just single values.
	This extension enables expression of multiple choices for parameters
	including supported algorithms and token endpoint authentication methods.
	This functionality is particularly useful when Automatic Registration
	<xref target="OpenID.Federation"/>
	is used, since there is no registration response from the OP
	to tell the RP what choices were made by the OP.
	This gives the OP the information that it needs to make choices about
	how to interact with the RP in ways that work for both parties.
      </t>
      <t>
	Single-valued metadata parameters for which corresponding
	multi-valued metadata parameters are defined by this specification
	are defined in these specifications:
	<list style="symbols">
	  <t>
	    OpenID Connect Dynamic Client Registration 1.0
	    <xref target="OpenID.Registration"/>
	  </t>
	  <t>
	    OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0
	    <xref target="CIBA.Core"/>
	  </t>
	  <t>
	    JWT Secured Authorization Response Mode for OAuth 2.0 (JARM)
	    <xref target="JARM"/>
	  </t>
	  <t>
	    JSON Web Token (JWT) Response for OAuth Token Introspection
	    <xref target="RFC9701"/>
	  </t>
	</list>
      </t>

      <section anchor="rnc" title="Requirements Notation and Conventions">
        <t>
          The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
          "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
          document are to be interpreted as described in
          BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>.
        </t>

	<t>
	  All uses of <xref target="JWS">JSON Web Signature (JWS)</xref>
	  and <xref target="JWE">JSON Web Encryption (JWE)</xref>
	  data structures in this specification utilize
	  the JWS Compact Serialization or the JWE Compact Serialization;
	  the JWS JSON Serialization and the JWE JSON Serialization are not used.
	</t>
      </section>

      <section anchor="Terminology" title="Terminology">
	<t>
	  This specification uses the terms
	  "Authorization Server",
	  "Client", "Client Authentication", "Client Identifier",
	  and "Token Endpoint"
	  defined by <xref target="RFC6749">OAuth 2.0</xref>,
	  the term "JSON Web Token (JWT)"
	  defined by <xref target="JWT">JSON Web Token (JWT)</xref>,
	  and the terms defined by
	  <xref target="OpenID.Core">OpenID Connect Core 1.0</xref> and
	  <xref target="OpenID.Registration">OpenID Connect Dynamic Client Registration 1.0</xref>.
	</t>
      </section>
    </section>

    <section anchor="ClientMetadata" title="Client Metadata">
      <t>Clients have metadata associated with their
      unique Client Identifier at the Authorization Server. These can range
      from human-facing display strings, such as a Client name, to items that
      impact the security of the protocol, such as the set of supported algorithms.
      </t>
      <t>The Client Metadata values are used in two ways:</t>
      <t>
	<list style="symbols">
	  <t>
	    as input values to registration requests, and
	  </t>
	  <t>
	    as output values in registration responses and read responses.
	  </t>
	</list>
      </t>
      <t>
	Enabling the RP to express all the choices that it supports
	for metadata parameters is particularly important when using
	Automatic Registration, as defined in
	Section 12.1 of OpenID Federation 1.0 <xref target="OpenID.Federation"/>,
	since it gives the OP the best opportunity to make good choices
	of what parameters to use when interacting with the RP.
	This specification is intended to faciliate such interactions.
      </t>
      <t>
	The Client Metadata parameters defined below MUST only be used
	as input values to registration requests,
	and not
	as output values in registration responses and read responses.
	Any output values used related to these multi-valued input parameters
	MUST be the associated corresponding single-valued metadata parameter.
      </t>
      <t>
	These Client Metadata parameters are defined by this specification:

	<list style="hanging">

	  <t hangText="subject_types_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    <spanx style="verb">subject_type</spanx>
	    values supported by the RP.
	    If a <spanx style="verb">subject_type</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="id_token_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    <xref target="JWS">JWS</xref> <spanx style="verb">alg</spanx> values
	    supported by the RP when validating the ID Token signature.
	    If an <spanx style="verb">id_token_signed_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="id_token_encryption_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    <xref target="JWE">JWE</xref> <spanx style="verb">alg</spanx> values
	    supported by the RP when decrypting the ID Token.
	    If an <spanx style="verb">id_token_encrypted_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="id_token_encryption_enc_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">enc</spanx> values
	    supported by the RP when decrypting the ID Token.
	    If an <spanx style="verb">id_token_encrypted_response_enc</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="userinfo_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWS <spanx style="verb">alg</spanx> values
	    supported by the RP when validating the UserInfo Response signature.
	    If a <spanx style="verb">userinfo_signed_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="userinfo_encryption_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">alg</spanx> values
	    supported by the RP when decrypting the UserInfo Response.
	    If a <spanx style="verb">userinfo_encrypted_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="userinfo_encryption_enc_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">enc</spanx> values
	    supported by the RP when decrypting the UserInfo Response.
	    If a <spanx style="verb">userinfo_encrypted_response_enc</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="request_object_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWS <spanx style="verb">alg</spanx> values
	    supported by the Client when signing Request Objects.
	    If a <spanx style="verb">request_object_signing_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="request_object_encryption_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">alg</spanx> values
	    supported by the Client when encrypting Request Objects.
	    If a <spanx style="verb">request_object_encryption_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="request_object_encryption_enc_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">enc</spanx> values
	    supported by the Client when encrypting Request Objects.
	    If a <spanx style="verb">request_object_encryption_enc</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="token_endpoint_auth_methods_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    Client Authentication methods supported by the Client.
	    If a <spanx style="verb">token_endpoint_auth_method</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	    Also see the discussion of this parameter in
	    <xref target="ClientAuthMethods"/>.
	  </t>

	  <t hangText="token_endpoint_auth_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWS <spanx style="verb">alg</spanx> values
	    supported by the Client when signing the JWT
	    used to authenticate the Client at the Token Endpoint
	    for the <spanx style="verb">private_key_jwt</spanx>
	    and <spanx style="verb">client_secret_jwt</spanx> authentication methods.
	    If a <spanx style="verb">token_endpoint_auth_signing_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="backchannel_authentication_request_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWS <spanx style="verb">alg</spanx> values
	    supported by the Client when signing the JWT
	    used for CIBA authentication requests.
	    If a <spanx style="verb">backchannel_authentication_request_signing_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="authorization_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWS <spanx style="verb">alg</spanx> values
	    supported by the Client for validating signed responses.
	    If an <spanx style="verb">authorization_signed_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="authorization_encryption_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">alg</spanx> values
	    supported by the Client for decrypting encrypted responses.
	    If an <spanx style="verb">authorization_encrypted_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="authorization_encryption_enc_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">enc</spanx> values
	    supported by the Client for decrypting encrypted responses.
	    If an <spanx style="verb">authorization_encrypted_response_enc</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="introspection_signing_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWS <spanx style="verb">alg</spanx> values
	    supported by the Client when validating the Introspection Response signature.
	    If an <spanx style="verb">introspection_signed_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="introspection_encryption_alg_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">alg</spanx> values
	    supported by the Client when decrypting the Introspection Response.
	    If an <spanx style="verb">introspection_encrypted_response_alg</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	  <t hangText="introspection_encryption_enc_values_supported">
	    <vspace/>
	    OPTIONAL.
	    JSON array containing a list of the
	    JWE <spanx style="verb">enc</spanx> values
	    supported by the Client when decrypting the Introspection Response.
	    If an <spanx style="verb">introspection_encrypted_response_enc</spanx>
	    metadata parameter is also present, its value MUST be in the list.
	  </t>

	</list>
      </t>
      <t>
	Additional Client Metadata parameters MAY be defined and used,
	as described in <xref target="RFC7591"/>.
      </t>
      <t>
	Note that the naming convention used for these metadata parameters
	is to use the name of the corresponding
	Authorization Server Metadata parameter when it exists.
	When it does not exist, the names chosen use the pattern
	<spanx style="verb">*_values_supported</spanx>,
	where <spanx style="verb">*</spanx> is the name of
	the corresponding single-valued Client Metadata parameter.
      </t>
    </section>

    <section anchor="ClientAuthMethods" title="Client Authentication Methods Supported">
      <t>
	The <spanx style="verb">token_endpoint_auth_methods_supported</spanx>
	metadata value is used, in practice, to indicate the
	Client Authentication Methods supported at any Authorization Server endpoint,
	not just the Token Endpoint.
	For instance, these same methods MUST be supported at
	the Revocation Endpoint <xref target="RFC7009"/>,
	the Introspection Endpoint <xref target="RFC7662"/>, and
	the Pushed Authorization Request Endpoint <xref target="RFC9126"/>,
	when they exist.
      </t>
      <t>
	It is a consensus position within the OpenID Connect working group that
	it was a mistake to create separate
	<spanx style="verb">revocation_endpoint_auth_methods_supported</spanx> and
	<spanx style="verb">introspection_endpoint_auth_methods_supported</spanx>
	Authorization Server Metadata parameters in <xref target="RFC8414"/>.
	This aligns with the decision by the OAuth Working group to use the
	<spanx style="verb">token_endpoint_auth_methods_supported</spanx> and
	<spanx style="verb">token_endpoint_auth_method</spanx> metadata parameters
	to describe the capabilities of the
	Pushed Authorization Request (PAR) Endpoint <xref target="RFC9126"/>,
	rather than creating new parameters that were PAR-specific.
      </t>
      <t>
	Consequently, this specification does not create
	<spanx style="verb">revocation_endpoint_auth_methods_supported</spanx> or
	<spanx style="verb">introspection_endpoint_auth_methods_supported</spanx>
	Client Metadata parameters.
      </t>
    </section>

    <section anchor="ImplementationConsiderations" title="Implementation Considerations">
      <t>
	To facilitate interoperability with implementations not supporting
	this specification, deployments SHOULD include
	the single-valued metadata parameter alongside
	the corresponding multi-valued metadata parameter with their
	preferred single value.
      </t>
      <t>
	Note that
	the Authorization Server might not support the single-valued parameter value.
	For instance, consider these metadata values:
	<figure>
          <artwork><![CDATA[
  "id_token_signing_alg_values_supported": ["ES256", "PS256", "RS256"],
  "id_token_signed_response_alg": "RS256"
]]></artwork>
        </figure>
      </t>
      <t>
	Authorization Server SHOULD NOT consider it an error when it doesn't support
	<spanx style="verb">RS256</spanx> if it supports either of the other choices
	<spanx style="verb">ES256</spanx> or <spanx style="verb">PS256</spanx>.
	It SHOULD use one of the choices that it does support, or reject the registration with the <spanx style="verb">invalid_client_metadata</spanx> error when none of the client-provided values are supported.
      </t>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>
	The security considerations when using these metadata parameters
	are the same as those when using the corresponding metadata parameters in
	<xref target="OpenID.Registration"/> and <xref target="OpenID.Discovery"/>
	or the other specifications in which they are defined.
      </t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <section anchor="DynRegRegistrations" title="OAuth Dynamic Client Registration Metadata Registry">
	<t>
	  This specification registers the following client metadata definitions
	  in the IANA "OAuth Dynamic Client Registration Metadata" registry
	  <xref target="IANA.OAuth.Parameters"/>
	  established by <xref target="RFC7591"/>.
	</t>

	<section anchor="DynRegContents" title="Registry Contents">
	  <t> <?rfc subcompact="yes"?>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">subject_types_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		<spanx style="verb">subject_type</spanx>
		values supported by the RP
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">id_token_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		<xref target="JWS">JWS</xref> <spanx style="verb">alg</spanx> values
		supported by the RP when validating the ID Token signature
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">id_token_encryption_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		<xref target="JWE">JWE</xref> <spanx style="verb">alg</spanx> values
		supported by the RP when decrypting the ID Token
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">id_token_encryption_enc_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">enc</spanx> values
		supported by the RP when decrypting the ID Token
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">userinfo_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWS <spanx style="verb">alg</spanx> values
		supported by the RP when validating the UserInfo Response signature
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">userinfo_encryption_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">alg</spanx> values
		supported by the RP when decrypting the UserInfo Response
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">userinfo_encryption_enc_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">enc</spanx> values
		supported by the RP when decrypting the UserInfo Response
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">request_object_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWS <spanx style="verb">alg</spanx> values
		supported by the Client when signing Request Objects
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">request_object_encryption_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">alg</spanx> values
		supported by the Client when encrypting Request Objects
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">request_object_encryption_enc_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">enc</spanx> values
		supported by the Client when encrypting Request Objects
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">token_endpoint_auth_methods_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		Client Authentication methods supported by the Client
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">token_endpoint_auth_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWS <spanx style="verb">alg</spanx> values
		supported by the Client when signing the JWT
		used to authenticate the Client at the Token Endpoint
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">backchannel_authentication_request_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWS <spanx style="verb">alg</spanx> values
		supported by the Client when signing the JWT
		used for CIBA authentication requests
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">authorization_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWS <spanx style="verb">alg</spanx> values
		supported by the Client for signed responses
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">authorization_encryption_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">alg</spanx> values
		supported by the Client for encrypted responses
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">authorization_encryption_enc_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">enc</spanx> values
		supported by the Client for encrypted responses
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">introspection_signing_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWS <spanx style="verb">alg</spanx> values
		supported by the Client when validating the Introspection Response signature
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">introspection_encryption_alg_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">alg</spanx> values
		supported by the Client when decrypting the Introspection Response
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	  <t>
	    <list style="symbols">
	      <t>
		Client Metadata Name: <spanx style="verb">introspection_encryption_enc_values_supported</spanx>
	      </t>
	      <t>
		Client Metadata Description:
		JSON array containing a list of the
		JWE <spanx style="verb">enc</spanx> values
		supported by the Client when decrypting the Introspection Response
	      </t>
	      <t>
		Change Controller: OpenID Foundation Artifact Binding Working Group - openid-specs-ab@lists.openid.net
	      </t>
	      <t>
		Specification Document(s): <xref target="ClientMetadata"/> of this specification
	      </t>
	    </list>
	  </t>
	</section>
	<?rfc subcompact="no"?>
      </section>

    </section>

  </middle>

  <back>
    <references title="Normative References">
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7009.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7662.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9126.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9701.xml"/>

      <reference anchor="OpenID.Core" target="https://openid.net/specs/openid-connect-core-1_0.html">
        <front>
          <title>OpenID Connect Core 1.0</title>

          <author fullname="Nat Sakimura" initials="N." surname="Sakimura">
            <organization abbrev="NAT.Consulting (was at NRI)">NAT.Consulting</organization>
          </author>

          <author fullname="John Bradley" initials="J." surname="Bradley">
            <organization abbrev="Yubico (was at Ping Identity)">Yubico</organization>
          </author>

          <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
            <organization abbrev="Self-Issued Consulting (was at Microsoft)">Self-Issued Consulting</organization>
          </author>

          <author fullname="Breno de Medeiros" initials="B." surname="de Medeiros">
            <organization abbrev="Google">Google</organization>
          </author>

	  <author fullname="Chuck Mortimore" initials="C." surname="Mortimore">
	    <organization abbrev="Disney (was at Salesforce)">Disney</organization>
	  </author>

          <date day="15" month="December" year="2023"/>
        </front>
      </reference>

      <reference anchor="OpenID.Discovery" target="https://openid.net/specs/openid-connect-discovery-1_0.html">
	<front>
	  <title>OpenID Connect Discovery 1.0</title>

	  <author fullname="Nat Sakimura" initials="N." surname="Sakimura">
	    <organization abbrev="NAT.Consulting (was at NRI)">NAT.Consulting</organization>
	  </author>

	  <author fullname="John Bradley" initials="J." surname="Bradley">
	    <organization abbrev="Yubico (was at Ping Identity)">Yubico</organization>
	  </author>

	  <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
	    <organization abbrev="Self-Issued Consulting (was at Microsoft)">Self-Issued Consulting</organization>
	  </author>

	  <author fullname="Edmund Jay" initials="E." surname="Jay">
	    <organization abbrev="Illumila">Illumila</organization>
	  </author>

          <date day="15" month="December" year="2023"/>
	</front>
      </reference>

      <reference anchor="OpenID.Registration" target="https://openid.net/specs/openid-connect-registration-1_0.html">
	<front>
	  <title>OpenID Connect Dynamic Client Registration 1.0</title>

	  <author fullname="Nat Sakimura" initials="N." surname="Sakimura">
	    <organization abbrev="NAT.Consulting (was at NRI)">NAT.Consulting</organization>
	  </author>

	  <author fullname="John Bradley" initials="J." surname="Bradley">
	    <organization abbrev="Yubico (was at Ping Identity)">Yubico</organization>
	  </author>

	  <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
	    <organization abbrev="Self-Issued Consulting (was at Microsoft)">Self-Issued Consulting</organization>
	  </author>

          <date day="15" month="December" year="2023"/>
	</front>
      </reference>

      <reference anchor="OpenID.Federation" target="https://openid.net/specs/openid-federation-1_0.html">
        <front>
          <title>OpenID Federation 1.0</title>

	  <author fullname="Roland Hedberg" initials="R." role="editor"
		  surname="Hedberg">
	    <organization>independent</organization>
	    <address>
	      <email>roland@catalogix.se</email>
	    </address>
	  </author>

	  <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
	    <organization>Self-Issued Consulting</organization>
	    <address>
	      <email>michael_b_jones@hotmail.com</email>
	      <uri>https://self-issued.info/</uri>
	    </address>
	  </author>

	  <author fullname="Andreas Åkre Solberg" initials="A.Å."
		  surname="Solberg">
	    <organization>Sikt</organization>
	    <address>
	      <email>Andreas.Solberg@sikt.no</email>
	      <uri>https://www.linkedin.com/in/andreassolberg/</uri>
	    </address>
	  </author>

	  <author fullname="John Bradley" initials="J." surname="Bradley">
	    <organization abbrev="Yubico">Yubico</organization>
	    <address>
	      <email>ve7jtb@ve7jtb.com</email>
	      <uri>https://www.linkedin.com/in/ve7jtb/</uri>
	    </address>
	  </author>

	  <author fullname="Giuseppe De Marco" initials="G." surname="De Marco">
	    <organization>independent</organization>
	    <address>
	      <email>demarcog83@gmail.com</email>
	      <uri>https://www.linkedin.com/in/giuseppe-de-marco-bb054245/</uri>
	    </address>
	  </author>

	  <author fullname="Vladimir Dzhuvinov" initials="V." surname="Dzhuvinov">
	    <organization>Connect2id</organization>
	    <address>
	      <email>vladimir@connect2id.com</email>
	      <uri>https://www.linkedin.com/in/vladimirdzhuvinov/</uri>
	    </address>
	  </author>

          <date day="4" month="December" year="2025"/>
        </front>
      </reference>

      <reference anchor="JWT" target="https://tools.ietf.org/html/rfc7519">
        <front>
          <title>JSON Web Token (JWT)</title>

          <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
            <organization abbrev="Microsoft">Microsoft</organization>
          </author>

          <author fullname="John Bradley" initials="J." surname="Bradley">
            <organization>Ping Identity</organization>
          </author>

          <author fullname="Nat Sakimura" initials="N." surname="Sakimura">
            <organization abbrev="NRI">Nomura Research Institute, Ltd.</organization>
          </author>

          <date month="May" year="2015" />
        </front>

	<seriesInfo name="RFC" value="7519"/>
	<seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>

      <reference anchor="JWS" target="https://tools.ietf.org/html/rfc7515">
        <front>
          <title>JSON Web Signature (JWS)</title>

          <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
            <organization abbrev="Microsoft">Microsoft</organization>
          </author>

          <author fullname="John Bradley" initials="J." surname="Bradley">
            <organization>Ping Identity</organization>
          </author>

          <author fullname="Nat Sakimura" initials="N." surname="Sakimura">
            <organization abbrev="NRI">Nomura Research Institute, Ltd.</organization>
          </author>

          <date month="May" year="2015" />
        </front>

	<seriesInfo name="RFC" value="7515"/>
	<seriesInfo name="DOI" value="10.17487/RFC7515"/>
      </reference>

      <reference anchor="JWE" target="https://tools.ietf.org/html/rfc7516">
        <front>
          <title>JSON Web Encryption (JWE)</title>

	  <author fullname="Michael B. Jones" initials="M.B." surname="Jones">
	    <organization>Microsoft</organization>
	  </author>

	  <author fullname="Joe Hildebrand" initials="J." surname="Hildebrand">
	    <organization>Cisco Systems, Inc.</organization>
	  </author>

	  <date month="May" year="2015" />
        </front>

	<seriesInfo name="RFC" value="7516"/>
	<seriesInfo name="DOI" value="10.17487/RFC7516"/>
      </reference>

      <reference anchor="IANA.OAuth.Parameters" target="https://www.iana.org/assignments/oauth-parameters">
        <front>
          <title>OAuth Parameters</title>
          <author>
            <organization>IANA</organization>
          </author>
	  <date/>
        </front>
      </reference>

      <reference anchor="JARM" target="https://openid.net/specs/oauth-v2-jarm.html">
	<front>
	  <title>JWT Secured Authorization Response Mode for OAuth 2.0 (JARM)</title>

	  <author fullname="Torsten Lodderstedt" initials="T." surname="Lodderstedt">
	    <organization>yes.com</organization>
	  </author>

	  <author fullname="Brian Campbell" initials="B." surname="Campbell">
	    <organization>Ping Identity</organization>
	  </author>

          <date day="9" month="November" year="2022"/>
	</front>
      </reference>

      <reference anchor="CIBA.Core" target="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html">
	<front>
	  <title>OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0</title>

	  <author fullname="Gonzalo Fernandez Rodriguez" initials="G." surname="Rodriguez">
	    <organization>Telefonica I+D</organization>
	  </author>

	  <author fullname="Florian Walter" initials="F." surname="Walter">
	    <organization>Deutsche Telekom AG</organization>
	  </author>

	  <author fullname="Axel Nennker" initials="A." surname="Nennker">
	    <organization>Deutsche Telekom AG</organization>
	  </author>

	  <author fullname="Dave Tonge" initials="D." surname="Tonge">
	    <organization>Moneyhub</organization>
	  </author>

	  <author fullname="Brian Campbell" initials="B." surname="Campbell">
	    <organization>Ping Identity</organization>
	  </author>

          <date day="1" month="September" year="2021"/>
	</front>
      </reference>

    </references>

    <references title="Informative References">

      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7591.xml"/>
      <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8414.xml"/>

    </references>

    <section anchor="Notices" title="Notices">
      <t>
        Copyright (c) 2026 The OpenID Foundation.
      </t>
      <t>
        The OpenID Foundation (OIDF) grants to any Contributor, developer,
        implementer, or other interested party a non-exclusive, royalty free,
        worldwide copyright license to reproduce, prepare derivative works from,
        distribute, perform and display, this Implementers Draft, Final
        Specification, or Final Specification Incorporating Errata Corrections
        solely for the purposes of (i) developing specifications,
        and (ii) implementing Implementers Drafts, Final Specifications,
        and Final Specification Incorporating Errata Corrections based
        on such documents, provided that attribution be made to the OIDF as the
        source of the material, but that such attribution does not indicate an
        endorsement by the OIDF.
      </t>
      <t>
        The technology described in this specification was made available
        from contributions from various sources, including members of the OpenID
        Foundation and others. Although the OpenID Foundation has taken steps to
        help ensure that the technology is available for distribution, it takes
        no position regarding the validity or scope of any intellectual property
        or other rights that might be claimed to pertain to the implementation
        or use of the technology described in this specification or the extent
        to which any license under such rights might or might not be available;
        neither does it represent that it has made any independent effort to
        identify any such rights. The OpenID Foundation and the contributors to
        this specification make no (and hereby expressly disclaim any)
        warranties (express, implied, or otherwise), including implied
        warranties of merchantability, non-infringement, fitness for a
        particular purpose, or title, related to this specification, and the
        entire risk as to implementing this specification is assumed by the
        implementer. The OpenID Intellectual Property Rights policy
        (found at openid.net) requires
        contributors to offer a patent promise not to assert certain patent
        claims against other contributors and against implementers.
        OpenID invites any interested party to bring to its attention any
        copyrights, patents, patent applications, or other proprietary rights
        that may cover technology that may be required to practice this
        specification.
      </t>
    </section>

    <section anchor="History" title="Document History">
      <t>[[ To be removed from the approved Final Specification ]]</t>

      <t>
	-05
	<list style="symbols">
	  <t>
	    Fixed #10: Corrected wording issues identified by Frederik Krogsdal Jacobsen.
	  </t>
	</list>
      </t>

      <t>
	-04
	<list style="symbols">
	  <t>
	    Fixed an error in the metadata parameter name not defined by the specification, changing it from
      <spanx style="verb">introspection_encryption_enc_values_supported</spanx> to
      <spanx style="verb">introspection_endpoint_auth_methods_supported</spanx>.
	  </t>
	</list>
        </t>

      <t>
	-03
	<list style="symbols">
	  <t>
	    Stated that the
	    <spanx style="verb">token_endpoint_auth_methods_supported</spanx>
	    metadata value is used to indicate the Client Authentication Methods
	    supported at any Authorization Server endpoint.
	  </t>
	</list>
      </t>

      <t>
	-02
	<list style="symbols">
	  <t>
	    Added multi-valued metadata parameters based on single-valued metadata parameters
	    in <xref target="CIBA.Core"/>, <xref target="JARM"/>, and <xref target="RFC9701"/>.
	  </t>
	  <t>
	    Documented the naming conventions used.
	  </t>
	  <t>
	    Added Filip Skokan as an author.
	  </t>
	  <t>
	    Added Implementation Considerations about including
	    the single-valued metadata parameter alongside
	    the corresponding multi-valued metadata parameter.
	  </t>
	</list>
      </t>

      <t>
	-01
        <list style="symbols">
	  <t>
	    Specified that the multi-valued metadata parameters defined herein
	    are to be used as registration request parameters
	    and not as registration response parameters.
	  </t>
	</list>
      </t>

      <t>
	-00
        <list style="symbols">
	  <t>
	    Initial version.
	  </t>
	</list>
      </t>

    </section>

    <section anchor="Acknowledgements" title="Acknowledgements" numbered="no">
      <t>
	The authors wish to acknowledge the contributions of the following
	people to this specification:
	Vladimir Dzhuvinov,
	Michael Fraser,
	Joseph Heenan,
	Frederik Krogsdal Jacobsen,
	Eduardo Perottoni,
	and
	Stefan Santesson.
      </t>
    </section>

  </back>
</rfc>
