Metadata Name,Metadata Description,Change Controller,Reference
issuer,Authorization server's issuer identifier URL,IESG,"[RFC8414, Section 2]"
authorization_endpoint,URL of the authorization server's authorization endpoint,IESG,"[RFC8414, Section 2]"
token_endpoint,URL of the authorization server's token endpoint,IESG,"[RFC8414, Section 2]"
jwks_uri,URL of the authorization server's JWK Set document,IESG,"[RFC8414, Section 2]"
registration_endpoint,URL of the authorization server's OAuth 2.0 Dynamic Client Registration Endpoint,IESG,"[RFC8414, Section 2]"
scopes_supported,"JSON array containing a list of the OAuth 2.0 ""scope"" values that this authorization server supports",IESG,"[RFC8414, Section 2]"
response_types_supported,"JSON array containing a list of the OAuth 2.0 ""response_type"" values that this authorization server supports",IESG,"[RFC8414, Section 2]"
response_modes_supported,"JSON array containing a list of the OAuth 2.0 ""response_mode"" values that this authorization server supports",IESG,"[RFC8414, Section 2]"
grant_types_supported,JSON array containing a list of the OAuth 2.0 grant type values that this authorization server supports,IESG,"[RFC8414, Section 2]"
token_endpoint_auth_methods_supported,JSON array containing a list of client authentication methods supported by this token endpoint,IESG,"[RFC8414, Section 2]"
token_endpoint_auth_signing_alg_values_supported,"JSON array containing a list of the JWS signing algorithms supported by the token endpoint for the
signature on the JWT used to authenticate the client at the token endpoint",IESG,"[RFC8414, Section 2]"
service_documentation,"URL of a page containing human-readable information that developers might want or need to know when using
the authorization server",IESG,"[RFC8414, Section 2]"
ui_locales_supported,"Languages and scripts supported for the user interface, represented as a JSON array of language tag values from BCP 47 [RFC5646]",IESG,"[RFC8414, Section 2]"
op_policy_uri,"URL that the authorization server provides to the person registering the client to read about the
authorization server's requirements on how the client can use the data provided by the authorization server",IESG,"[RFC8414, Section 2]"
op_tos_uri,"URL that the authorization server provides to the person registering the client to read about the
authorization server's terms of service",IESG,"[RFC8414, Section 2]"
revocation_endpoint,URL of the authorization server's OAuth 2.0 revocation endpoint,IESG,"[RFC8414, Section 2]"
revocation_endpoint_auth_methods_supported,JSON array containing a list of client authentication methods supported by this revocation endpoint,IESG,"[RFC8414, Section 2]"
revocation_endpoint_auth_signing_alg_values_supported,"JSON array containing a list of the JWS signing algorithms supported by the revocation endpoint
for the signature on the JWT used to authenticate the client at the revocation endpoint",IESG,"[RFC8414, Section 2]"
introspection_endpoint,URL of the authorization server's OAuth 2.0 introspection endpoint,IESG,"[RFC8414, Section 2]"
introspection_endpoint_auth_methods_supported,JSON array containing a list of client authentication methods supported by this introspection endpoint,IESG,"[RFC8414, Section 2]"
introspection_endpoint_auth_signing_alg_values_supported,"JSON array containing a list of the JWS signing algorithms supported by the introspection endpoint for the
signature on the JWT used to authenticate the client at the introspection endpoint",IESG,"[RFC8414, Section 2]"
code_challenge_methods_supported,PKCE code challenge methods supported by this authorization server,IESG,"[RFC8414, Section 2]"
signed_metadata,"Signed JWT containing metadata values about
the authorization server as claims",IESG,"[RFC8414, Section 2.1]"
device_authorization_endpoint,URL of the authorization server's device authorization endpoint,IESG,"[RFC8628, Section 4]"
tls_client_certificate_bound_access_tokens,"Indicates authorization server support for
mutual-TLS client certificate-bound access tokens.",IESG,"[RFC8705, Section 3.3]"
mtls_endpoint_aliases,"JSON object containing alternative
authorization server endpoints, which a client intending to do
mutual TLS will use in preference to the conventional endpoints.",IESG,"[RFC8705, Section 5]"
nfv_token_signing_alg_values_supported,"JSON array containing a list of the JWS signing algorithms supported by the
server for signing the JWT used as NFV Token",[ETSI],[ETSI GS NFV-SEC 022 V2.7.1]
nfv_token_encryption_alg_values_supported,"JSON array containing a list of the JWE encryption algorithms (alg values)
supported by the server to encode the JWT used as NFV Token",[ETSI],[ETSI GS NFV-SEC 022 V2.7.1]
nfv_token_encryption_enc_values_supported,"JSON array containing a list of the JWE encryption algorithms (enc values)
supported by the server to encode the JWT used as NFV Token",[ETSI],[ETSI GS NFV-SEC 022 V2.7.1]
userinfo_endpoint,URL of the OP's UserInfo Endpoint,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
acr_values_supported,JSON array containing a list of the Authentication Context Class References that this OP supports,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
subject_types_supported,JSON array containing a list of the Subject Identifier types that this OP supports,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
id_token_signing_alg_values_supported,"JSON array containing a list of the JWS ""alg"" values supported by the OP for the ID Token",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
id_token_encryption_alg_values_supported,"JSON array containing a list of the JWE ""alg"" values supported by the OP for the ID Token",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
id_token_encryption_enc_values_supported,"JSON array containing a list of the JWE ""enc"" values supported by the OP for the ID Token",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
userinfo_signing_alg_values_supported,"JSON array containing a list of the JWS ""alg"" values supported by the UserInfo Endpoint",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
userinfo_encryption_alg_values_supported,"JSON array containing a list of the JWE ""alg"" values supported by the UserInfo Endpoint",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
userinfo_encryption_enc_values_supported,"JSON array containing a list of the JWE ""enc"" values supported by the UserInfo Endpoint",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
request_object_signing_alg_values_supported,"JSON array containing a list of the JWS ""alg"" values supported by the OP for Request Objects",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
request_object_encryption_alg_values_supported,"JSON array containing a list of the JWE ""alg"" values supported by the OP for Request Objects",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
request_object_encryption_enc_values_supported,"JSON array containing a list of the JWE ""enc"" values supported by the OP for Request Objects",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
display_values_supported,"JSON array containing a list of the ""display"" parameter values that the OpenID Provider supports",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
claim_types_supported,JSON array containing a list of the Claim Types that the OpenID Provider supports,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
claims_supported,JSON array containing a list of the Claim Names of the Claims that the OpenID Provider MAY be able to supply values for,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
claims_locales_supported,"Languages and scripts supported for values in Claims being returned, represented as a JSON array of BCP 47 [RFC5646] language tag values",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
claims_parameter_supported,"Boolean value specifying whether the OP supports use of the ""claims"" parameter",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
request_parameter_supported,"Boolean value specifying whether the OP supports use of the ""request"" parameter",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
request_uri_parameter_supported,"Boolean value specifying whether the OP supports use of the ""request_uri"" parameter",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
require_request_uri_registration,"Boolean value specifying whether the OP requires any ""request_uri"" values used to be pre-registered",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Discovery 1.0, Section 3]"
require_signed_request_object,"Indicates where authorization request needs
to be protected as Request Object and provided through either
request or request_uri parameter.",IETF,"[RFC9101, Section 10.5]"
pushed_authorization_request_endpoint,"URL of the authorization server's pushed
authorization request endpoint",IESG,"[RFC9126, Section 5]"
require_pushed_authorization_requests,"Indicates whether the authorization server
accepts authorization requests only via PAR.",IESG,"[RFC9126, Section 5]"
introspection_signing_alg_values_supported,JSON array containing a list of algorithms supported by the authorization server for introspection response signing,IETF,"[RFC9701, Section 7]"
introspection_encryption_alg_values_supported,"JSON array containing a list of algorithms
supported by the authorization server for introspection response
content key encryption (alg value)",IETF,"[RFC9701, Section 7]"
introspection_encryption_enc_values_supported,"JSON array containing a list of algorithms
supported by the authorization server for introspection response
content encryption (enc value)",IETF,"[RFC9701, Section 7]"
authorization_response_iss_parameter_supported,Boolean value indicating whether the authorization server provides the iss parameter in the authorization response.,IETF,"[RFC9207, Section 3]"
check_session_iframe,"URL of an OP iframe that supports cross-origin communications for session state information with the RP Client, using the HTML5 postMessage API",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Session Management 1.0, Section 3.3]"
frontchannel_logout_supported,"Boolean value specifying whether the OP supports HTTP-based logout, with true indicating support",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Front-Channel Logout 1.0, Section 3]"
backchannel_logout_supported,"Boolean value specifying whether the OP supports back-channel logout, with true indicating support",[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Back-Channel Logout 1.0, Section 2]"
backchannel_logout_session_supported,Boolean value specifying whether the OP can pass a sid (session ID) Claim in the Logout Token to identify the RP session with the OP,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect Back-Channel Logout 1.0, Section 2]"
end_session_endpoint,URL at the OP to which an RP can perform a redirect to request that the End-User be logged out at the OP,[OpenID_Foundation_Artifact_Binding_Working_Group],"[OpenID Connect RP-Initiated Logout 1.0, Section 2.1]"
backchannel_token_delivery_modes_supported,Supported CIBA authentication result delivery modes,[OpenID_Foundation_MODRNA_Working_Group],"[OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4]"
backchannel_authentication_endpoint,CIBA Backchannel Authentication Endpoint,[OpenID_Foundation_MODRNA_Working_Group],"[OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4]"
backchannel_authentication_request_signing_alg_values_supported,JSON array containing a list of the JWS signing algorithms supported for validation of signed CIBA authentication requests,[OpenID_Foundation_MODRNA_Working_Group],"[OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4]"
backchannel_user_code_parameter_supported,Indicates whether the OP supports the use of the CIBA user_code parameter.,[OpenID_Foundation_MODRNA_Working_Group],"[OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0, Section 4]"
authorization_details_types_supported,JSON array containing the authorization details types the AS supports,IETF,"[RFC9396, Section 10]"
dpop_signing_alg_values_supported,JSON array containing a list of the JWS algorithms supported for DPoP proof JWTs,IETF,"[RFC9449, Section 5.1]"
client_registration_types_supported,Client Registration Types Supported,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.1.3 of OpenID Federation 1.0]
federation_registration_endpoint,Federation Registration Endpoint,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.1.3 of OpenID Federation 1.0]
request_authentication_methods_supported,Authentication request authentication methods supported,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.1.3 of OpenID Federation 1.0]
request_authentication_signing_alg_values_supported,JSON array containing the JWS signing algorithms supported for the signature on the JWT used to authenticate the request,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.1.3 of OpenID Federation 1.0]
signed_jwks_uri,URL referencing a signed JWT having this authorization server's JWK Set document as its payload,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.2.1 of OpenID Federation 1.0]
jwks,"JSON Web Key Set document, passed by value",[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.2.1 of OpenID Federation 1.0]
organization_name,Human-readable name representing the organization owning this authorization server,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.2.2 of OpenID Federation 1.0]
contacts,"Array of strings representing ways to contact people responsible for this authorization server, typically email addresses",[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.2.2 of OpenID Federation 1.0]
logo_uri,URL that references a logo for the organization owning this authorization server,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.2.2 of OpenID Federation 1.0]
homepage_uri,URL of a Web page for the organization owning this authorization server,[OpenID_Foundation_Artifact_Binding_Working_Group],[Section 5.2.2 of OpenID Federation 1.0]
protected_resources,JSON array containing a list of resource identifiers for OAuth protected resources,IETF,"[RFC9728, Section 4]"
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016gqnxjtx.com.cn
www.fmhlbw.com.cn
www.lqfcjs.com.cn
hsequi.com.cn
www.lygwtbz.com.cn
www.goseven.net.cn
www.ubbxec.com.cn
www.voam.com.cn
www.spylkj.net.cn
miyih.org.cn