Skip to content

Commit

Permalink
Cleaned up version deltas to follow conventions
Browse files Browse the repository at this point in the history
  • Loading branch information
dsbivan committed May 23, 2022
1 parent 9662c9a commit 64a87ee
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 4 deletions.
3 changes: 1 addition & 2 deletions slate/source/includes/_register.md.erb
Original file line number Diff line number Diff line change
Expand Up @@ -45,8 +45,7 @@ standards.

+ Added GetDataHolderBrandsSummary API to expose public details of Data Holder Brands from the CDR Register to public clients

* x-v header requirements for versioned Register APIs moved from mandatory to optional

x-v header requirements for versioned Register APIs moved from mandatory to optional
```

<%= partial "includes/cds_register.md" %>
3 changes: 2 additions & 1 deletion slate/source/includes/security/_client_registration.md.erb
Original file line number Diff line number Diff line change
Expand Up @@ -216,7 +216,8 @@ Participants **MUST** support, at a minimum, the following ID Token algorithms:
### Registration Validation

```diff
+ Added requirement for data holders to ignore unsupported authorisation scopes
Added the following requirement:
+ Data Holders MUST ignore unsupported authorisation scopes presented in the SSA for the creation and update of client registrations.
```

Validation and use of the JWT and the claims described above **MUST** be performed in accordance with **[[JWT]](#nref-JWT)**.
Expand Down
3 changes: 2 additions & 1 deletion slate/source/includes/security/_participant_statuses.md.erb
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,8 @@ The table below outlines the end state for each Register entry type:
### Data Holder Responsibilities

```diff
+ Added clarification that when statuses are not received or recognised from the CDR Register, the ACCC can inform Data Holders of statuses to trust using an alternative mechanism. There is no upper bound for how long previous status values should remain trusted.
Added the following requirement:
+ Data Holders SHOULD continue to use the previous status value until a valid value is returned by the CDR Register or the ACCC informs the Data Holder using an alternative mechanism. There is no upper bound for how long previous status values should remain trusted.
```

The CDR Registrar has the ability to change the status of a Software Product independently of the Data Recipient's accreditation status. Therefore, both the Data Recipient and Software Product statuses **SHOULD** be referenced, to determine the Data Holder's responsibilities for data disclosure, consent and registration management.
Expand Down

0 comments on commit 64a87ee

Please sign in to comment.