Internet Assigned Numbers Authority OAuth Parameters Created 2012-07-27 Last Updated 2025-08-04 Available Formats [IMG] XML [IMG] HTML [IMG] Plain text Registries Included Below ??OAuth Access Token Types ??OAuth Authorization Endpoint Response Types ??OAuth Extensions Error Registry ??OAuth Parameters ??OAuth Token Type Hints ??OAuth URI ??OAuth Dynamic Client Registration Metadata ??OAuth Token Endpoint Authentication Methods ??PKCE Code Challenge Methods ??OAuth Token Introspection Response ??OAuth Authorization Server Metadata ??OAuth Protected Resource Metadata OAuth Access Token Types Registration Procedure(s) Specification Required Expert(s) Hannes Tschofenig, Mike Jones Reference [RFC6749][RFC8414] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC6749]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Name Additional Token Endpoint Response Parameters HTTP Authentication Scheme(s) Change Controller Reference Bearer Bearer IETF [RFC6750] N_A IESG [RFC8693, Section 2.2.1] PoP cnf, rs_cnf (see section 3.1 of [RFC8747] and section 3.2 of N/A IETF [RFC9200] [RFC9201]). DPoP DPoP IETF [RFC9449] OAuth Authorization Endpoint Response Types Registration Procedure(s) Specification Required Expert(s) Hannes Tschofenig, Mike Jones Reference [RFC6749] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC6749]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Name Change Controller Reference code IETF [RFC6749] code id_token [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] code id_token token [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] code token [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] id_token [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] id_token token [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] none [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] token IETF [RFC6749] OAuth Extensions Error Registry Registration Procedure(s) Specification Required Expert(s) Hannes Tschofenig, Mike Jones Reference [RFC6749] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC6749]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Name Usage Location Protocol Extension Change Controller Reference invalid_request resource access bearer access IETF [RFC6750] error response token type invalid_token resource access bearer access IETF [RFC6750] error response token type insufficient_scope resource access bearer access IETF [RFC6750] error response token type revocation token revocation unsupported_token_type endpoint error endpoint IETF [RFC7009] response [OpenID Connect interaction_required authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect login_required authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect account_selection_required authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect consent_required authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect invalid_request_uri authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect invalid_request_object authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect request_not_supported authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect request_uri_not_supported authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] [OpenID Connect registration_not_supported authorization OpenID Connect [OpenID_Foundation_Artifact_Binding_Working_Group] Core 1.0 endpoint incorporating errata set 1] need_info (and its subsidiary authorization [UMA 2.0 Grant parameters) server response, Kantara UMA [Kantara_UMA_WG] for OAuth 2.0, token endpoint Section 3.3.6] authorization [UMA 2.0 Grant request_denied server response, Kantara UMA [Kantara_UMA_WG] for OAuth 2.0, token endpoint Section 3.3.6] request_submitted (and its subsidiary authorization [UMA 2.0 Grant parameters) server response, Kantara UMA [Kantara_UMA_WG] for OAuth 2.0, token endpoint Section 3.3.6] authorization_pending Token endpoint [RFC8628] IETF [RFC8628, Section response 3.5] access_denied Token endpoint [RFC8628] IETF [RFC8628, Section response 3.5] slow_down Token endpoint [RFC8628] IETF [RFC8628, Section response 3.5] expired_token Token endpoint [RFC8628] IETF [RFC8628, Section response 3.5] implicit grant invalid_target error response, resource parameter IESG [RFC8707] token error response unsupported_pop_key token error [RFC9200] IETF [RFC9200, Section response 5.8.3] incompatible_ace_profiles token error [RFC9200] IETF [RFC9200, Section response 5.8.3] token endpoint, OAuth 2.0 Rich [RFC9396, Section invalid_authorization_details authorization Authorization IETF 5] endpoint Requests token error Demonstrating invalid_dpop_proof response, resource Proof of IETF [RFC9449] access error Possession (DPoP) response token error Demonstrating use_dpop_nonce response, resource Proof of IETF [RFC9449] access error Possession (DPoP) response resource access OAuth 2.0 Step Up [RFC9470, Section insufficient_user_authentication error response Authentication IETF 3] Challenge Protocol Authorization [Section 12.1.2 missing_trust_anchor Endpoint OpenID Federation [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID Federation 1.0] Authorization [Section 12.1.2 validation_failed Endpoint OpenID Federation [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID Federation 1.0] OAuth Parameters Registration Procedure(s) Specification Required Expert(s) Hannes Tschofenig, Mike Jones Reference [RFC6749] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC6749]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Name Parameter Usage Location Change Controller Reference client_id authorization request, token IETF [RFC6749] request client_secret token request IETF [RFC6749] response_type authorization request IETF [RFC6749] redirect_uri authorization request, token IETF [RFC6749] request authorization request, scope authorization response, token IETF [RFC6749] request, token response state authorization request, IETF [RFC6749] authorization response code authorization response, token IETF [RFC6749] request error authorization response, token IETF [RFC6749] response error_description authorization response, token IETF [RFC6749] response error_uri authorization response, token IETF [RFC6749] response grant_type token request IETF [RFC6749] access_token authorization response, token IETF [RFC6749] response token_type authorization response, token IETF [RFC6749] response expires_in authorization response, token IETF [RFC6749] response username token request IETF [RFC6749] password token request IETF [RFC6749] refresh_token token request, token response IETF [RFC6749] nonce authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] display authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] prompt authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] max_age authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] ui_locales authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] claims_locales authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] id_token_hint authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] login_hint authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] acr_values authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] claims authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] registration authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] request authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] request_uri authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] id_token authorization response, access [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 token response incorporating errata set 1] session_state authorization response, access [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Session Management token response 1.0, Section 2] assertion token request IESG [RFC7521] client_assertion token request IESG [RFC7521] client_assertion_type token request IESG [RFC7521] code_verifier token request IESG [RFC7636] code_challenge authorization request IESG [RFC7636] code_challenge_method authorization request IESG [RFC7636] claim_token client request, token endpoint [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, Section 3.3.1] pct client request, token endpoint [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, Section 3.3.1] pct authorization server response, [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, token endpoint Section 3.3.5] rpt client request, token endpoint [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, Section 3.3.1] ticket client request, token endpoint [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, Section 3.3.1] upgraded authorization server response, [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, token endpoint Section 3.3.5] vtr authorization request, token IESG [RFC8485] request device_code token request IESG [RFC8628, Section 3.1] resource authorization request, token IESG [RFC8707] request audience token request IESG [RFC8693, Section 2.1] requested_token_type token request IESG [RFC8693, Section 2.1] subject_token token request IESG [RFC8693, Section 2.1] subject_token_type token request IESG [RFC8693, Section 2.1] actor_token token request IESG [RFC8693, Section 2.1] actor_token_type token request IESG [RFC8693, Section 2.1] issued_token_type token response IESG [RFC8693, Section 2.2.1] response_mode Authorization Request [OpenID_Foundation_Artifact_Binding_Working_Group] [OAuth 2.0 Multiple Response Type Encoding Practices] nfv_token Access Token Response [ETSI] [ETSI GS NFV-SEC 022 V2.7.1] iss authorization request, IETF [RFC9207, Section authorization response 2][RFC9101][RFC7519, Section 4.1.1] sub authorization request IETF [RFC7519, Section 4.1.2][RFC9101] aud authorization request IETF [RFC7519, Section 4.1.3][RFC9101] exp authorization request IETF [RFC7519, Section 4.1.4][RFC9101] nbf authorization request IETF [RFC7519, Section 4.1.5][RFC9101] iat authorization request IETF [RFC7519, Section 4.1.6][RFC9101] jti authorization request IETF [RFC7519, Section 4.1.7][RFC9101] ace_profile token response IETF [RFC9200, Sections 5.8.2, 5.8.4.3] nonce1 client-rs request IETF [RFC9203] nonce2 rs-client response IETF [RFC9203] ace_client_recipientid client-rs request IETF [RFC9203] ace_server_recipientid rs-client response IETF [RFC9203] req_cnf token request IETF [RFC9201, Section 5] rs_cnf token response IETF [RFC9201, Section 5] cnf token response IETF [RFC9201, Section 5] authorization_details authorization request, token IETF [RFC9396] request, token response dpop_jkt authorization request IETF [RFC9449, Section 10] sign_info client-rs request, rs-client IETF [RFC9594] response kdcchallenge rs-client response IETF [RFC9594] trust_chain authorization request [OpenID_Foundation_Artifact_Binding_Working_Group] [Section 12.1.1.1.2 of OpenID Federation 1.0] OAuth Token Type Hints Registration Procedure(s) Specification Required Expert(s) Torsten Lodderstedt, Mike Jones Reference [RFC7009] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC7009]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Hint Value Change Controller Reference access_token IETF [RFC7009] refresh_token IETF [RFC7009] pct [Kantara_UMA_WG] [UMA 2.0 Grant for OAuth 2.0, Section 3.7] OAuth URI Registration Procedure(s) Specification Required Expert(s) Hannes Tschofenig, Mike Jones Reference [RFC6755] Note Prefix: urn:ietf:params:oauth Available Formats [IMG] CSV URN Common Name Change Controller Reference urn:ietf:params:oauth:grant-type:jwt-bearer JWT Bearer Token Grant Type Profile for OAuth IESG [RFC7523] 2.0 urn:ietf:params:oauth:client-assertion-type:jwt-bearer JWT Bearer Token Profile for OAuth 2.0 Client IESG [RFC7523] Authentication urn:ietf:params:oauth:grant-type:saml2-bearer SAML 2.0 Bearer Assertion Grant Type Profile IESG [RFC7522] for OAuth 2.0 urn:ietf:params:oauth:client-assertion-type:saml2-bearer SAML 2.0 Bearer Assertion Profile for OAuth IESG [RFC7522] 2.0 Client Authentication urn:ietf:params:oauth:token-type:jwt JSON Web Token (JWT) Token Type IESG [RFC7519] urn:ietf:params:oauth:grant-type:device_code Device flow grant type for OAuth 2.0 IESG [RFC8628, Section 3.1] urn:ietf:params:oauth:grant-type:token-exchange Token exchange grant type for OAuth 2.0 IESG [RFC8693, Section 2.1] urn:ietf:params:oauth:token-type:access_token Token type URI for an OAuth 2.0 access token IESG [RFC8693, Section 3] urn:ietf:params:oauth:token-type:refresh_token Token type URI for an OAuth 2.0 refresh token IESG [RFC8693, Section 3] urn:ietf:params:oauth:token-type:id_token Token type URI for an ID Token IESG [RFC8693, Section 3] urn:ietf:params:oauth:token-type:saml1 Token type URI for a base64url-encoded SAML IESG [RFC8693, Section 3] 1.1 assertion urn:ietf:params:oauth:token-type:saml2 Token type URI for a base64url-encoded SAML IESG [RFC8693, Section 3] 2.0 assertion urn:ietf:params:oauth:request_uri A URN Sub-Namespace for OAuth Request URIs. IESG [RFC9126, Section 2.2] urn:ietf:params:oauth:jwk-thumbprint JWK Thumbprint URI IESG [RFC9278] urn:ietf:params:oauth:ckt COSE Key Thumbprint URI IETF [RFC9679] OAuth Dynamic Client Registration Metadata Registration Procedure(s) Specification Required Expert(s) Justin Richer Reference [RFC7591] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC7591]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Client Metadata Name Client Metadata Change Controller Reference Description Array of redirection URIs redirect_uris for use in redirect-based IESG [RFC7591] flows Requested authentication token_endpoint_auth_method method for the token IESG [RFC7591] endpoint Array of OAuth 2.0 grant grant_types types that the client may IESG [RFC7591] use Array of the OAuth 2.0 response_types response types that the IESG [RFC7591] client may use Human-readable name of client_name the client to be IESG [RFC7591] presented to the user URL of a web page client_uri providing information IESG [RFC7591] about the client logo_uri URL that references a IESG [RFC7591] logo for the client scope Space-separated list of IESG [RFC7591] OAuth 2.0 scope values Array of strings representing ways to contacts contact people IESG [RFC7591] responsible for this client, typically email addresses URL that points to a tos_uri human-readable terms of IESG [RFC7591] service document for the client URL that points to a policy_uri human-readable policy IESG [RFC7591] document for the client URL referencing the client's JSON Web Key Set jwks_uri [RFC7517] document IESG [RFC7591] representing the client's public keys Client's JSON Web Key Set jwks [RFC7517] document IESG [RFC7591] representing the client's public keys Identifier for the software_id software that comprises a IESG [RFC7591] client Version identifier for software_version the software that IESG [RFC7591] comprises a client client_id Client identifier IESG [RFC7591] client_secret Client secret IESG [RFC7591] client_id_issued_at Time at which the client IESG [RFC7591] identifier was issued client_secret_expires_at Time at which the client IESG [RFC7591] secret will expire OAuth 2.0 Bearer Token registration_access_token used to access the client IESG [RFC7592] configuration endpoint Fully qualified URI of registration_client_uri the client registration IESG [RFC7592] endpoint [OpenID Connect Dynamic application_type Kind of the application [OpenID_Foundation_Artifact_Binding_Working_Group] Client -- "native" or "web" Registration 1.0 incorporating errata set 2] [OpenID Connect URL using the https Dynamic sector_identifier_uri scheme to be used in [OpenID_Foundation_Artifact_Binding_Working_Group] Client calculating Pseudonymous Registration Identifiers by the OP 1.0 incorporating errata set 2] [OpenID Connect subject_type requested Dynamic subject_type for responses to this [OpenID_Foundation_Artifact_Binding_Working_Group] Client Client -- "pairwise" or Registration "public" 1.0 incorporating errata set 2] [OpenID Connect JWS alg algorithm Dynamic id_token_signed_response_alg REQUIRED for signing the [OpenID_Foundation_Artifact_Binding_Working_Group] Client ID Token issued to this Registration Client 1.0 incorporating errata set 2] [OpenID Connect JWE alg algorithm Dynamic id_token_encrypted_response_alg REQUIRED for encrypting [OpenID_Foundation_Artifact_Binding_Working_Group] Client the ID Token issued to Registration this Client 1.0 incorporating errata set 2] [OpenID Connect JWE enc algorithm Dynamic id_token_encrypted_response_enc REQUIRED for encrypting [OpenID_Foundation_Artifact_Binding_Working_Group] Client the ID Token issued to Registration this Client 1.0 incorporating errata set 2] [OpenID Connect JWS alg algorithm Dynamic userinfo_signed_response_alg REQUIRED for signing [OpenID_Foundation_Artifact_Binding_Working_Group] Client UserInfo Responses Registration 1.0 incorporating errata set 2] [OpenID Connect JWE alg algorithm Dynamic userinfo_encrypted_response_alg REQUIRED for encrypting [OpenID_Foundation_Artifact_Binding_Working_Group] Client UserInfo Responses Registration 1.0 incorporating errata set 2] [OpenID Connect JWE enc algorithm Dynamic userinfo_encrypted_response_enc REQUIRED for encrypting [OpenID_Foundation_Artifact_Binding_Working_Group] Client UserInfo Responses Registration 1.0 incorporating errata set 2] [OpenID Connect JWS alg algorithm that Dynamic request_object_signing_alg MUST be used for signing [OpenID_Foundation_Artifact_Binding_Working_Group] Client Request Objects sent to Registration the OP 1.0 incorporating errata set 2] [OpenID JWE alg algorithm the RP Connect is declaring that it may Dynamic request_object_encryption_alg use for encrypting [OpenID_Foundation_Artifact_Binding_Working_Group] Client Request Objects sent to Registration the OP 1.0 incorporating errata set 2] [OpenID JWE enc algorithm the RP Connect is declaring that it may Dynamic request_object_encryption_enc use for encrypting [OpenID_Foundation_Artifact_Binding_Working_Group] Client Request Objects sent to Registration the OP 1.0 incorporating errata set 2] JWS alg algorithm that [OpenID MUST be used for signing Connect the JWT used to Dynamic token_endpoint_auth_signing_alg authenticate the Client [OpenID_Foundation_Artifact_Binding_Working_Group] Client at the Token Endpoint for Registration the private_key_jwt and 1.0 client_secret_jwt incorporating authentication methods errata set 2] [OpenID Connect Dynamic default_max_age Default Maximum [OpenID_Foundation_Artifact_Binding_Working_Group] Client Authentication Age Registration 1.0 incorporating errata set 2] [OpenID Connect Boolean value specifying Dynamic require_auth_time whether the auth_time [OpenID_Foundation_Artifact_Binding_Working_Group] Client Claim in the ID Token is Registration REQUIRED 1.0 incorporating errata set 2] [OpenID Connect Default requested Dynamic default_acr_values Authentication Context [OpenID_Foundation_Artifact_Binding_Working_Group] Client Class Reference values Registration 1.0 incorporating errata set 2] [OpenID Connect URI using the https Dynamic initiate_login_uri scheme that a third party [OpenID_Foundation_Artifact_Binding_Working_Group] Client can use to initiate a Registration login by the RP 1.0 incorporating errata set 2] [OpenID Connect Array of request_uri Dynamic request_uris values that are [OpenID_Foundation_Artifact_Binding_Working_Group] Client pre-registered by the RP Registration for use at the OP 1.0 incorporating errata set 2] [UMA 2.0 claims_redirect_uris claims redirection [Kantara_UMA_WG] Grant for endpoints OAuth 2.0, Section 2] JWS alg algorithm [ETSI GS nfv_token_signed_response_alg required for signing the [ETSI] NFV-SEC 022 nfv Token issued to this V2.7.1] Client JWE alg algorithm [ETSI GS nfv_token_encrypted_response_alg required for encrypting [ETSI] NFV-SEC 022 the nfv Token issued to V2.7.1] this Client JWE enc algorithm [ETSI GS nfv_token_encrypted_response_enc required for encrypting [ETSI] NFV-SEC 022 the nfv Token issued to V2.7.1] this Client Indicates the client's intention to use [RFC8705, tls_client_certificate_bound_access_tokens mutual-TLS client [IESG] Section 3.4] certificate-bound access tokens. String value specifying [RFC8705, tls_client_auth_subject_dn the expected subject DN [IESG] Section of the client 2.1.2] certificate. String value specifying [RFC8705, tls_client_auth_san_dns the expected dNSName SAN [IESG] Section entry in the client 2.1.2] certificate. String value specifying the expected [RFC8705, tls_client_auth_san_uri uniformResourceIdentifier [IESG] Section SAN entry in the client 2.1.2] certificate. String value specifying [RFC8705, tls_client_auth_san_ip the expected iPAddress [IESG] Section SAN entry in the client 2.1.2] certificate. String value specifying [RFC8705, tls_client_auth_san_email the expected rfc822Name [IESG] Section SAN entry in the client 2.1.2] certificate. Indicates where authorization request needs to be protected as [RFC9101, require_signed_request_object Request Object and [IETF] Section 10.5] provided through either request or request_uri parameter. Indicates whether the require_pushed_authorization_requests client is required to use [IESG] [RFC9126, PAR to initiate Section 6] authorization requests. String value indicating introspection_signed_response_alg the client¡¯s desired [IETF] [RFC9701, introspection response Section 6] signing algorithm String value specifying the desired introspection [RFC9701, introspection_encrypted_response_alg response content key [IETF] Section 6] encryption algorithm (alg value) String value specifying the desired introspection [RFC9701, introspection_encrypted_response_enc response content [IETF] Section 6] encryption algorithm (enc value) RP URL that will cause [OpenID the RP to log itself out Connect frontchannel_logout_uri when rendered in an [OpenID_Foundation_Artifact_Binding_Working_Group] Front-Channel iframe by the OP Logout 1.0, Section 2] Boolean value specifying whether the RP requires that a sid (session ID) [OpenID query parameter be Connect frontchannel_logout_session_required included to identify the [OpenID_Foundation_Artifact_Binding_Working_Group] Front-Channel RP session with the OP Logout 1.0, when the Section 2] frontchannel_logout_uri is used RP URL that will cause [OpenID the RP to log itself out Connect backchannel_logout_uri when sent a Logout Token [OpenID_Foundation_Artifact_Binding_Working_Group] Back-Channel by the OP Logout 1.0, Section 2.2] Boolean value specifying whether the RP requires that a sid (session ID) [OpenID Claim be included in the Connect backchannel_logout_session_required Logout Token to identify [OpenID_Foundation_Artifact_Binding_Working_Group] Back-Channel the RP session with the Logout 1.0, OP when the Section 2.2] backchannel_logout_uri is used Array of URLs supplied by the RP to which it MAY [OpenID request that the Connect post_logout_redirect_uris End-User's User Agent be [OpenID_Foundation_Artifact_Binding_Working_Group] RP-Initiated redirected using the Logout 1.0, post_logout_redirect_uri Section 3.1] parameter after a logout has been performed Indicates what [RFC9396, authorization_details_types authorization details [IETF] Section 10] types the client uses. Boolean value specifying dpop_bound_access_tokens whether the client always [IETF] [RFC9449, uses DPoP for token Section 5.2] requests An array of strings [Section specifying the client 5.1.2 of client_registration_types registration types the RP [OpenID_Foundation_Artifact_Binding_Working_Group] OpenID wants to use Federation 1.0] URL referencing a signed [Section JWT having the client's 5.2.1 of signed_jwks_uri JWK Set document as its [OpenID_Foundation_Artifact_Binding_Working_Group] OpenID payload Federation 1.0] Human-readable name [Section representing the 5.2.2 of organization_name organization owning this [OpenID_Foundation_Artifact_Binding_Working_Group] OpenID client Federation 1.0] [Section URL of a Web page for the 5.2.2 of homepage_uri organization owning this [OpenID_Foundation_Artifact_Binding_Working_Group] OpenID client Federation 1.0] [Section URL of a Web page for the 5.2.2.1.1 of use_mtls_endpoint_aliases organization owning this [OpenID_Foundation_FAPI_Working_Group] FAPI 2.0 client Security Profile] Non-empty array of strings, where each [Section 5.1 string is a JWE [RFC7516] of OpenID for encrypted_response_enc_values_supported enc algorithm that can be [OpenID_Foundation_Digital_Credentials_Protocols_Working_Group] Verifiable used as the content Presentations encryption algorithm for 1.0] encrypting the Response An object containing a [Section 11.1 list of name/value pairs, of OpenID for vp_formats_supported where the name is a [OpenID_Foundation_Digital_Credentials_Protocols_Working_Group] Verifiable string identifying a Presentations Credential format 1.0] supported by the Verifier OAuth Token Endpoint Authentication Methods Registration Procedure(s) Specification Required Expert(s) Justin Richer Reference [RFC7591][RFC8414] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC7591]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Token Endpoint Authentication Method Name Change Controller Reference none IESG [RFC7591] client_secret_post IESG [RFC7591] client_secret_basic IESG [RFC7591] client_secret_jwt [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] private_key_jwt [OpenID_Foundation_Artifact_Binding_Working_Group] [OpenID Connect Core 1.0 incorporating errata set 1] tls_client_auth IESG [RFC8705, Section 2.1.1] self_signed_tls_client_auth IESG [RFC8705, Section 2.2.1] PKCE Code Challenge Methods Registration Procedure(s) Specification Required Expert(s) John Bradley, Mike Jones Reference [RFC7636] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC7636]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Code Challenge Method Parameter Name Change Controller Reference plain IESG [Section 4.2 of RFC7636] S256 IESG [Section 4.2 of RFC7636] OAuth Token Introspection Response Registration Procedure(s) Specification Required Expert(s) Justin Richer Reference [RFC7662] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC7662]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Name Description Change Controller Reference active Token active status IESG [RFC7662, Section 2.2] username User identifier of the resource owner IESG [RFC7662, Section 2.2] client_id Client identifier of the client IESG [RFC7662, Section 2.2] scope Authorized scopes of the token IESG [RFC7662, Section 2.2] token_type Type of the token IESG [RFC7662, Section 2.2] exp Expiration timestamp of the token IESG [RFC7662, Section 2.2] iat Issuance timestamp of the token IESG [RFC7662, Section 2.2] nbf Timestamp which the token is not valid before IESG [RFC7662, Section 2.2] sub Subject of the token IESG [RFC7662, Section 2.2] aud Audience of the token IESG [RFC7662, Section 2.2] iss Issuer of the token IESG [RFC7662, Section 2.2] jti Unique identifier of the token IESG [RFC7662, Section 2.2] permissions array of objects, each describing a scoped, time-limitable [Kantara_UMA_WG] [Federated Authorization for UMA 2.0, permission for a resource Section 5.1.1] vot Vector of Trust value IESG [RFC8485] vtm Vector of Trust trustmark URL IESG [RFC8485] act Actor IESG [RFC8693, Section 4.1] may_act Authorized Actor - the party that is authorized to become the IESG [RFC8693, Section 4.4] actor cnf Confirmation IESG [RFC7800][RFC8705] ace_profile The ACE profile used between the client and RS. IETF [RFC9200, Section 5.9.2] "client-nonce". A nonce previously provided to the AS by the RS cnonce via the client. Used to verify token freshness when the RS cannot IETF [RFC9200, Section 5.9.2] synchronize its clock with the AS. cti "CWT ID". The identifier of a CWT as defined in [RFC8392]. IETF [RFC9200, Section 5.9.2] "Expires in". Lifetime of the token in seconds from the time the exi RS first sees it. Used to implement a weaker form of token IETF [RFC9200, Section 5.9.2] expiration for devices that cannot synchronize their internal clocks. The member authorization_details contains a JSON array of JSON authorization_details objects representing the rights of the access token. Each JSON IETF [RFC9396, Section 9.2] object contains the data to specify the authorization requirements for a certain type of resource. acr Authentication Context Class Reference IETF [RFC9470, Section 6.2] auth_time Time when the user authentication occurred IETF [RFC9470, Section 6.2] OAuth Authorization Server Metadata Registration Procedure(s) Specification Required Expert(s) Mike Jones, Nat Sakimura, John Bradley, Dick Hardt Reference [RFC8414] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC8414]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Metadata Name Metadata Change Controller Reference Description Authorization [RFC8414, issuer server's issuer IESG Section 2] identifier URL URL of the authorization [RFC8414, authorization_endpoint server's IESG Section 2] authorization endpoint URL of the token_endpoint authorization IESG [RFC8414, server's token Section 2] endpoint URL of the jwks_uri authorization IESG [RFC8414, server's JWK Set Section 2] document URL of the authorization server's OAuth [RFC8414, registration_endpoint 2.0 Dynamic IESG Section 2] Client Registration Endpoint JSON array containing a list of the OAuth 2.0 [RFC8414, scopes_supported "scope" values IESG Section 2] that this authorization server supports JSON array containing a list of the OAuth 2.0 [RFC8414, response_types_supported "response_type" IESG Section 2] values that this authorization server supports JSON array containing a list of the OAuth 2.0 [RFC8414, response_modes_supported "response_mode" IESG Section 2] values that this authorization server supports JSON array containing a list of the OAuth 2.0 [RFC8414, grant_types_supported grant type values IESG Section 2] that this authorization server supports JSON array containing a list of client [RFC8414, token_endpoint_auth_methods_supported authentication IESG Section 2] methods supported by this token endpoint JSON array containing a list of the JWS signing algorithms token_endpoint_auth_signing_alg_values_supported supported by the IESG [RFC8414, token endpoint Section 2] for the signature on the JWT used to authenticate the client at the token endpoint URL of a page containing human-readable information that [RFC8414, service_documentation developers might IESG Section 2] want or need to know when using the authorization server Languages and scripts supported for the user interface, [RFC8414, ui_locales_supported represented as a IESG Section 2] JSON array of language tag values from BCP 47 [RFC5646] URL that the authorization server provides to the person registering the client to read about the [RFC8414, op_policy_uri authorization IESG Section 2] server's requirements on how the client can use the data provided by the authorization server URL that the authorization server provides to the person op_tos_uri registering the IESG [RFC8414, client to read Section 2] about the authorization server's terms of service URL of the authorization [RFC8414, revocation_endpoint server's OAuth IESG Section 2] 2.0 revocation endpoint JSON array containing a list of client revocation_endpoint_auth_methods_supported authentication IESG [RFC8414, methods supported Section 2] by this revocation endpoint JSON array containing a list of the JWS signing algorithms supported by the revocation_endpoint_auth_signing_alg_values_supported revocation IESG [RFC8414, endpoint for the Section 2] signature on the JWT used to authenticate the client at the revocation endpoint URL of the authorization [RFC8414, introspection_endpoint server's OAuth IESG Section 2] 2.0 introspection endpoint JSON array containing a list of client introspection_endpoint_auth_methods_supported authentication IESG [RFC8414, methods supported Section 2] by this introspection endpoint JSON array containing a list of the JWS signing algorithms supported by the introspection_endpoint_auth_signing_alg_values_supported introspection IESG [RFC8414, endpoint for the Section 2] signature on the JWT used to authenticate the client at the introspection endpoint PKCE code challenge methods [RFC8414, code_challenge_methods_supported supported by this IESG Section 2] authorization server Signed JWT containing signed_metadata metadata values IESG [RFC8414, about the Section 2.1] authorization server as claims URL of the authorization [RFC8628, device_authorization_endpoint server's device IESG Section 4] authorization endpoint Indicates authorization server support [RFC8705, tls_client_certificate_bound_access_tokens for mutual-TLS IESG Section 3.3] client certificate-bound access tokens. JSON object containing alternative authorization server endpoints, mtls_endpoint_aliases which a client IESG [RFC8705, intending to do Section 5] mutual TLS will use in preference to the conventional endpoints. JSON array containing a list of the JWS signing [ETSI GS NFV-SEC nfv_token_signing_alg_values_supported algorithms [ETSI] 022 V2.7.1] supported by the server for signing the JWT used as NFV Token JSON array containing a list of the JWE encryption [ETSI GS NFV-SEC nfv_token_encryption_alg_values_supported algorithms (alg [ETSI] 022 V2.7.1] values) supported by the server to encode the JWT used as NFV Token JSON array containing a list of the JWE encryption [ETSI GS NFV-SEC nfv_token_encryption_enc_values_supported algorithms (enc [ETSI] 022 V2.7.1] values) supported by the server to encode the JWT used as NFV Token URL of the OP's [OpenID Connect userinfo_endpoint UserInfo Endpoint [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, Section 3] JSON array containing a list of the [OpenID Connect acr_values_supported Authentication [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, Context Class Section 3] References that this OP supports JSON array containing a list [OpenID Connect subject_types_supported of the Subject [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, Identifier types Section 3] that this OP supports JSON array containing a list [OpenID Connect id_token_signing_alg_values_supported of the JWS "alg" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the OP for the ID Token JSON array containing a list [OpenID Connect id_token_encryption_alg_values_supported of the JWE "alg" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the OP for the ID Token JSON array containing a list [OpenID Connect id_token_encryption_enc_values_supported of the JWE "enc" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the OP for the ID Token JSON array containing a list [OpenID Connect userinfo_signing_alg_values_supported of the JWS "alg" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the UserInfo Endpoint JSON array containing a list [OpenID Connect userinfo_encryption_alg_values_supported of the JWE "alg" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the UserInfo Endpoint JSON array containing a list [OpenID Connect userinfo_encryption_enc_values_supported of the JWE "enc" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the UserInfo Endpoint JSON array containing a list [OpenID Connect request_object_signing_alg_values_supported of the JWS "alg" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the OP for Request Objects JSON array containing a list [OpenID Connect request_object_encryption_alg_values_supported of the JWE "alg" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the OP for Request Objects JSON array containing a list [OpenID Connect request_object_encryption_enc_values_supported of the JWE "enc" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, values supported Section 3] by the OP for Request Objects JSON array containing a list [OpenID Connect display_values_supported of the "display" [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, parameter values Section 3] that the OpenID Provider supports JSON array containing a list [OpenID Connect claim_types_supported of the Claim [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, Types that the Section 3] OpenID Provider supports JSON array containing a list of the Claim [OpenID Connect claims_supported Names of the [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, Claims that the Section 3] OpenID Provider MAY be able to supply values for Languages and scripts supported for values in Claims being [OpenID Connect claims_locales_supported returned, [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, represented as a Section 3] JSON array of BCP 47 [RFC5646] language tag values Boolean value specifying [OpenID Connect claims_parameter_supported whether the OP [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, supports use of Section 3] the "claims" parameter Boolean value specifying [OpenID Connect request_parameter_supported whether the OP [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, supports use of Section 3] the "request" parameter Boolean value specifying [OpenID Connect request_uri_parameter_supported whether the OP [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, supports use of Section 3] the "request_uri" parameter Boolean value specifying whether the OP [OpenID Connect require_request_uri_registration requires any [OpenID_Foundation_Artifact_Binding_Working_Group] Discovery 1.0, "request_uri" Section 3] values used to be pre-registered Indicates where authorization request needs to be protected as require_signed_request_object Request Object IETF [RFC9101, and provided Section 10.5] through either request or request_uri parameter. URL of the authorization [RFC9126, pushed_authorization_request_endpoint server's pushed IESG Section 5] authorization request endpoint Indicates whether the authorization require_pushed_authorization_requests server accepts IESG [RFC9126, authorization Section 5] requests only via PAR. JSON array containing a list of algorithms introspection_signing_alg_values_supported supported by the IETF [RFC9701, authorization Section 7] server for introspection response signing JSON array containing a list of algorithms supported by the introspection_encryption_alg_values_supported authorization IETF [RFC9701, server for Section 7] introspection response content key encryption (alg value) JSON array containing a list of algorithms supported by the introspection_encryption_enc_values_supported authorization IETF [RFC9701, server for Section 7] introspection response content encryption (enc value) Boolean value indicating whether the authorization [RFC9207, authorization_response_iss_parameter_supported server provides IETF Section 3] the iss parameter in the authorization response. URL of an OP iframe that supports cross-origin [OpenID Connect check_session_iframe communications [OpenID_Foundation_Artifact_Binding_Working_Group] Session for session state Management 1.0, information with Section 3.3] the RP Client, using the HTML5 postMessage API Boolean value specifying whether the OP [OpenID Connect frontchannel_logout_supported supports [OpenID_Foundation_Artifact_Binding_Working_Group] Front-Channel HTTP-based Logout 1.0, logout, with true Section 3] indicating support Boolean value specifying whether the OP [OpenID Connect backchannel_logout_supported supports [OpenID_Foundation_Artifact_Binding_Working_Group] Back-Channel back-channel Logout 1.0, logout, with true Section 2] indicating support Boolean value specifying whether the OP can pass a sid [OpenID Connect backchannel_logout_session_supported (session ID) [OpenID_Foundation_Artifact_Binding_Working_Group] Back-Channel Claim in the Logout 1.0, Logout Token to Section 2] identify the RP session with the OP URL at the OP to which an RP can perform a [OpenID Connect end_session_endpoint redirect to [OpenID_Foundation_Artifact_Binding_Working_Group] RP-Initiated request that the Logout 1.0, End-User be Section 2.1] logged out at the OP [OpenID Connect Supported CIBA Client-Initiated backchannel_token_delivery_modes_supported authentication [OpenID_Foundation_MODRNA_Working_Group] Backchannel result delivery Authentication modes Flow - Core 1.0, Section 4] [OpenID Connect CIBA Backchannel Client-Initiated backchannel_authentication_endpoint Authentication [OpenID_Foundation_MODRNA_Working_Group] Backchannel Endpoint Authentication Flow - Core 1.0, Section 4] JSON array containing a list of the JWS [OpenID Connect signing Client-Initiated backchannel_authentication_request_signing_alg_values_supported algorithms [OpenID_Foundation_MODRNA_Working_Group] Backchannel supported for Authentication validation of Flow - Core 1.0, signed CIBA Section 4] authentication requests Indicates whether [OpenID Connect the OP supports Client-Initiated backchannel_user_code_parameter_supported the use of the [OpenID_Foundation_MODRNA_Working_Group] Backchannel CIBA user_code Authentication parameter. Flow - Core 1.0, Section 4] JSON array containing the [RFC9396, authorization_details_types_supported authorization IETF Section 10] details types the AS supports JSON array containing a list dpop_signing_alg_values_supported of the JWS IETF [RFC9449, algorithms Section 5.1] supported for DPoP proof JWTs Client [Section 5.1.3 client_registration_types_supported Registration [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID Types Supported Federation 1.0] Federation [Section 5.1.3 federation_registration_endpoint Registration [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID Endpoint Federation 1.0] Authentication [Section 5.1.3 request_authentication_methods_supported request [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID authentication Federation 1.0] methods supported JSON array containing the JWS signing algorithms [Section 5.1.3 request_authentication_signing_alg_values_supported supported for the [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID signature on the Federation 1.0] JWT used to authenticate the request URL referencing a signed JWT having this [Section 5.2.1 signed_jwks_uri authorization [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID server's JWK Set Federation 1.0] document as its payload JSON Web Key Set [Section 5.2.1 jwks document, passed [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID by value Federation 1.0] Human-readable name representing [Section 5.2.2 organization_name the organization [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID owning this Federation 1.0] authorization server Array of strings representing ways to contact people [Section 5.2.2 contacts responsible for [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID this Federation 1.0] authorization server, typically email addresses URL that references a logo for the [Section 5.2.2 logo_uri organization [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID owning this Federation 1.0] authorization server URL of a Web page for the [Section 5.2.2 homepage_uri organization [OpenID_Foundation_Artifact_Binding_Working_Group] of OpenID owning this Federation 1.0] authorization server JSON array containing a list protected_resources of resource IETF [RFC9728, identifiers for Section 4] OAuth protected resources OAuth Protected Resource Metadata Registration Procedure(s) Specification Required Expert(s) Michael Jones, Dick Hardt Reference [RFC9728] Note Registration requests should be sent to [oauth-ext-review@ietf.org], as described in [RFC9728]. If approved, designated experts should notify IANA within two weeks. For assistance, please contact iana@iana.org. IANA does not monitor the list. Available Formats [IMG] CSV Metadata Name Metadata Description Change Controller Reference resource Protected resource's resource identifier URL IETF [RFC9728, Section 2] authorization_servers JSON array containing a list of OAuth authorization server IETF [RFC9728, Section 2] issuer identifiers jwks_uri URL of the protected resource's JWK Set document IETF [RFC9728, Section 2] JSON array containing a list of the OAuth 2.0 scope values scopes_supported that are used in authorization requests to request access to IETF [RFC9728, Section 2] this protected resource bearer_methods_supported JSON array containing a list of the OAuth 2.0 bearer token IETF [RFC9728, Section 2] presentation methods that this protected resource supports JSON array containing a list of the JWS signing algorithms resource_signing_alg_values_supported (alg values) supported by the protected resource for signed IETF [RFC9728, Section 2] content resource_name Human-readable name of the protected resource IETF [RFC9728, Section 2] URL of a page containing human-readable information that resource_documentation developers might want or need to know when using the IETF [RFC9728, Section 2] protected resource URL of a page containing human-readable information about resource_policy_uri the protected resource's requirements on how the client can IETF [RFC9728, Section 2] use the data provided by the protected resource resource_tos_uri URL of a page containing human-readable information about IETF [RFC9728, Section 2] the protected resource's terms of service tls_client_certificate_bound_access_tokens Boolean value indicating protected resource support for IETF [RFC9728, Section 2] mutual-TLS client certificate-bound access tokens JSON array containing a list of the authorization details authorization_details_types_supported type values supported by the resource server when the IETF [RFC9728, Section 2] authorization_details request parameter is used dpop_signing_alg_values_supported JSON array containing a list of the JWS alg values supported IETF [RFC9728, Section 2] by the resource server for validating DPoP proof JWTs dpop_bound_access_tokens_required Boolean value specifying whether the protected resource IETF [RFC9728, Section 2] always requires the use of DPoP-bound access tokens signed_metadata Signed JWT containing metadata parameters about the IETF [RFC9728, Section 2.2] protected resource as claims Contact Information ID Name Contact URI Last Updated [ETSI] ETSI mailto:pnns&etsi.org 2019-07-22 Internet [IESG] Engineering mailto:iesg&ietf.org Steering Group Internet [IETF] Engineering mailto:ietf&ietf.org Task Force Kantara Initiative [Kantara_UMA_WG] User-Managed mailto:staff&kantarainitiative.org 2018-04-23 Access Work Group OpenID Foundation [OpenID_Foundation_Artifact_Binding_Working_Group] Artifact mailto:openid-specs-ab&lists.openid.net 2022-09-23 Binding Working Group OpenID Foundation Digital [OpenID_Foundation_Digital_Credentials_Protocols_Working_Group] Credentials mailto:openid-specs-digital-credentials-protocols&lists.openid.net 2025-08-04 Protocols Working Group OpenID [OpenID_Foundation_FAPI_Working_Group] Foundation mailto:openid-specs-fapi&lists.openid.net 2025-04-28 FAPI Working Group OpenID Foundation [OpenID_Foundation_MODRNA_Working_Group] MODRNA mailto:openid-specs-mobile-profile&lists.openid.net 2022-12-01 Working Group Licensing Terms Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù ENTER NUMBET 0016gxkgwx.com.cn
www.jzsbmall.com.cn
www.lwchain.com.cn
mbchain.com.cn
www.jmqdky.com.cn
goob.net.cn
mkmk.net.cn
www.viviyp.org.cn
www.prlous.com.cn
www.nianz.com.cn
中文字幕的h电影 xiao 色网 美国女性裸体图片网 最新的成人网站网址 雷丝兔宝宝更新50p 露男人下体的黄色a片有哪些 如月群真贴吧福利图 骚妹影院删除 黑山三高中孟璐 欧美写真在线视频 老色狗网站 父女乱伦纯肉文 八匹狼资源站 屄掰女 操逼都有那电视剧 www三级片cnm 我爱逼另类小说 我和隔壁阿姨黄色小说 人i与动物快播 苍井空【50p】 人与兽黄片视频一级片 耻体少妇 操美女尸体小说 ribennvrendeyindaoyouduochang 美国少女露鲍人体大胆艺术照 女人操屄图片 波多野结衣内射中出快播播放 你的屄毛 摩悦菁艺上海电子有限公司 激情小说美女色图 h幼女小说txt 我爱大学生无码迅雷下载 排球女将24rmvb 欧美女人醉酒露出图片 90后性a网 女性人体艺术狠撸 禄草裙社区 美国拍av的明星 迷奸媳妇舔食淫液小说 WWW_49223_COM 日本空姐被操视频 裸摸骚逼 百度爬灰小说老卫和儿媳 潮吹女王30p 偷拍电影伦理片 西西欧美美女大胆秀人体艺术 3000人体摄影艺术 操幼女小驻逼小说 妹の秘密种子下载 WWW_OMBYY_COM 自拍视频2 我和嫂子的做爱故事 WWW_6186 骚货颜射 美女穴穴高清图片 鸡爸巴插逼视频 三级片黄片做爱片 欧美做爱图片20p 美女淫荡性交图片 色狂い8人娘 木村真理惠 电影 8844ddd 干肉丝袜少妇 爆肏女明星 亚洲 套图 偷拍 WWW_UESSS_COM 欧美美女内衣写真真集 爱贝导航 绿妈文同好交流社区 围城读后感 白酒招商政策 吴苇珊 taijong 香港古装三级bt 掰开蜜穴 av9cc 天涯导航色 快播播放器的黄色网站 男生女生在床糟逼电影 五月天色网偷拍自拍 女人爱操逼怎么办 我与男同事的性爱 三级色色色色网 操逼有害不可大力日比 有什么好看的成人电影网 多淫荡少妇15p segif 鸭哥哥yx日本 明星色巴 影音先锋日本av女优妹妹电影 性感明星大尺度艳照 gayjiaonu 中国肥女人人体 撸一撸6666 伊在爱商城成人色爱 治阳瘘早泄的中药泡酒 色狠久撸啊撸小说 wwwsqo 姐姐图片穴 霪霪网在线视频免费 日本av毛片迅雷种子 变态图区911色色色 美女清纯性撸图 佐藤吉吉影音 黑人狂操亚裔女 heisiyouwu 成人做爱动态视频 色亚小说 夜色视频免费观看20 欧美性交第一会所 伦乱透屄故事 WWW190JCOM 操姨妈导航 西西色老头人体艺术 婶婶你真骚 哥哥干手机小说 美国sex网站导航 日本av三级文学 朋友妈妈巨乳诱惑快播 插骚逼屁眼 876αv电影 WWWANGOULECOM 鸭妹妹子网址 日本落体做爰图片 neishesaoxue ed2k国产熟女 床上草视频 少妇爱爱撸 迅雷在线激情乱伦 刘亦菲合成15p 美女光定身体图片 六六床戏 抽插穴屌流 WWWJNVCOMTLBFE 黄色小说片子 激激色 成人最猛网站视频 寂寞少妇的诱惑最新章节 男主角20年后与女主角重遇的欧美电影 十次啦美国小说 大鸡巴香烟价格 欧美超模被操 WWW66MMDDCOM 少妇挤奶50p 骚女大姨妈来了16p 午夜三级小说快播 亚洲少女性图 张柏芝loub 555电影三级2013118 zooskool经典系列 苍井空ed2k华为 国产母狗 打炮口活美女3g 狠狠碰xxoo成人电影免播放器在线观看 人体模特小游 媳妇浪穴 男人为什么喜欢吃女人逼逼 先锋影院在线观看 幼女养成h文 823824 看性感动漫 这个被操的嗷嗷叫爱色网 成人图片漏图 馒头逼吧 非洲大阴蒂 我爱和老女人做爱 东南亚少女10p 曰本为什么喜欢拍成人片 大美女的鲍鱼被狂插 美女裸体图片欧美色图2010 5252avi xiaoshuocao 百度大尺度美女图片 一起看吧动感之星影音先锋 小孩草大人的小说 色色小说综合 最猛成人网站 ziweiqun 百合纯肉真人电影 优希麻琴女教师 婷婷五月香基地 欧美性爱制度诱惑另类图片 圣诞老人射小妞和强奸小妞动话片 成人世界摸摸你 哥要蝴蝶谷娱乐中文网 日本三级艳星人体艺术 爆乳母娘仙桃影视网 欧美性爱色图网站 色涩黑木耳 韩国美女插洞 xxoo网av在线视频男人天堂 www294caocommsequ1co 欧美骚逼网 夜射狼AV亚洲在线视频 贵阳成人国产自拍 李毅情趣小说 fatgirlchineseav 操姐姐娱乐 欧美人体校园 五月激情乱伦小说网 王者荣耀cosplayav 人妻的淫逼 十大中字无码动漫名字 在线福利社天龙八部 做爱揉捏抽插三级图片 男少年同性插屁眼小说 930影城色色影城 手机看成人动作大片 野猪网俄罗斯理论电影 农村tongjian 表姐穆婷婷 pp55牛叉B电影 2017伦理中文字幕剧情 图解李宗瑞艳照 成人激情运动 色偷偷成人资源站 bqq477看av群 台湾淫荡老婆 优优影视www44pecomwwwseqingyouyou285621cc 插嫩嫩的护士10pwww5zipaicom 加勒比ad 短篇剧情网站 zzz76zycom 现代激情校园春色html 蔡依林邪恶小说 动漫亚洲强奸乱伦magnet porn家教 狠狠操妈妈的穴 亚洲成人网站做爱小视频 wwwdphzrnetcn 94yrocm 妈妈供我上学14利群 印度美女坐脸 韩国肏屄magnet 日韩新片网成人动漫 亚里沙综合 360自拍偷拍自慰小视频 百度厕所偷拍在线视频 西西阴陪人体艺术 性感美女风骚丝袜子 淫乱妈妈王的母亲节 乱伦小说调教性奴表姐 港台bt 人妖超碰XXOO免费视频 绝美学生妹课间女主 p8成人电影网站免费 kaori养母轮奸 黄色电影在哪里获得 人妻武侠第1页 www502日本少妇com 强奸美女秘书黄色小说 爆操美女吉吉 经典有声插插中和网 爱福利撸wwwfulilubacom av办公室ol AV美丽川mxiaomemecom 日本wwwsao 操嫩15p成人 aog里番 找幼破身小说 美女女性交图片 人体裸体metcn庄媛 原沙奈央 捆绑系列20p 和女同事激情做爱 xxoo波多野结衣 松本美影片 幼女性交体会 wwwx32bcxv 大胆人体嫩穴艺术摄影 操嫂子肉逼 就爱大片网的网址 爱我多深ipad在线看 不卡的av52 www999xbxbcom 成熟少妇图片 先锋免费成年电影 超碰四虎网站 AVcooavmoocom 性爱区在现看 龙口门影音先锋在线看 日本女被深喉15P 孙女在厨房内射 狼国48Q 上了白虎姐姐 wwwepornercom 色图动图 激淫15p wwwav三级 人妖丝袜美臀 3P书屋 手机新域名ady手机看片 熟女30pdizhi 水菜丽scute在线 2017狠狠撸最新网址 插b免费视频 姐妹监禁教师 欧美gv下载 WWWSAO117COM 口述我和妹妹的欲望 swwwporndigcom 丝袜姜女操动态图 222bob 翁媳操逼乱伦 男同志AV在线 淫荡明星在线 女生把男生的肉棒放到嘴里 素人妻第1页伦理电影在线观看伦理电影网站伦理聚合 女优舌头舔屏幕av 18福利影院 91视频AV 1238100有毒吗 青青草女用道具在线视频 超碰av免费视频超在线wwwcao077com 伦理片安乐战场 黑人操社区影院导航 志村玲子手机在线观看 激情五月色视频www031ncom 免费看天天A片美女图片免费 1333ccc Wwwdidi319com 精品50p www53cccc 小学生AV910ppcom 色色射撸 偷拍厕所台湾妹中文 wwwsss258com 老淑女逼毛视频 现代激情人妻乱伦 最新热情网页 www路bu780 老婆出轨了搞她比以前水多了 色师傅按摩 东方在线50o 阴蒂小电影 操荔 在线青青视频免费观 色系x小说 99视频久久热视频 乱伦乱奸 亚卅av在线视频 啪啪小说阅读 韩国情侣做爱高清自拍看巨乳多多影音 淫荡乱伦图区 av在线网址l 撸管视频网 女厕拍2014视频 35aaacorn 我爱大咪咪黄片 www89bbecon下载 在洗澡的时候做爱 插逼穴图片 伦理吃奶小说 国产sss视频在线 人妻乱抡小说 97色播五月 大阴茎插进小舅妈 大机巴饶了我吧视频 97122997WYTXXX87627EEEcom 玩弄女星破处 xvideosgratistv另类变态 亚洲变态另类色图天堂网 五月天色色新版图片 熟女乱伦先锋影音 亚洲0xox 色色色色色射射 www色cam 印度成人色图 超碰网址发布野 奸插干网站 omeixingaishicila 姐姐被我插屄 有一个裸聊的直播网页 催情药调教美妇 wwww色五月C0m 偷啪i 搞AV自拍图 xfplay自拍 日本丝袜无码影音先锋播放 淫淫孩子 嫩逼穴成人美女 998zyzco钬唌 色狼色哥哥色姐姐 在线妻子乱轮偷情 欧美辣图沾花网 爽爽在线ab 操妹妹国产 成人嘿咻嘿咻网 深夜福利在线看天上人 老婆卖淫小说 吸白嫩的女人 影音在线久久草 内射学生幼幼 wwwky757com为什么看不了 插插插综合小说网comwwwssss88com 人妻女友之撸撸 日少妇av 肉棒抽查操干图片 慢慢射亚洲色图 nnyythunder 影音先锋网制服丝袜 乱伦阿姨AV在线 两个男人一起自慰 免插件高清合集 大鸡巴用力操激情性爱 很骚的MⅤ 魔王在线iav99 好看站手机站版 双插另类 欧美一级黄色大片 噜噜哭 成人网站成人色图成人视频 色罗莉怎么看不了了 操已婚情人在线视频 闹洞房就去干 野外性交xxxx 欧美女人潮吹视频在线观看 酒色哥我爱撸 少妇 熟女 聚会 生活照自拍 照片 丰满 性感 皇瑟luan lun 成人色视频网 换妻俱乐部4p无码照片 小草影视龚iue菲新金瓶电影先锋 校园春色乱轮 网盘下载 国产a片 狗骚女 强叉美女小穴 无马欧美 张筱雨人体去术精选 丝袜妹妹求我插 女孩 做爱 自拍 几月采阴陈 时间暂停器全套12部 乱伦小说女婿与丈母娘 长筒袜做爱图片 骚屄3p 少妇巨乳诱惑影音先锋 夜夜斎颂逡帐? 全祼体女张筱雨 四房色播五月天色小姐 最新肥胖人体艺术摄影 仓井空巨乳女教师 强根宝有没有用 插大奶胖逼 兽交片小说 0809嫩逼导航 肉丝少妇狠狠撸 农村淫乱做爱 d2e487f00000079f 操淫荡小姨子 自拍操穴 美女最大胆裸体艺术写真 影音先锋溜冰影院 插阴道人体艺术大图大全 帕丽斯希尔顿哈佛一夜性爱录象带影音先锋 动物jiao 淫荡诛仙 熟妇中出哥哥射俺去撸 姬岛琉璃种子 少妇粉红鲍鱼穴 韩国女主播之香淑影音先锋 女教师与学生性交网盘 第一会所亚洲无码熟女 韩国裸体性交 26uuu图片 能播放的欧美群交视频 咸色小说 幼逼百图 全裸掰开逼逼大尺度人体艺术 日本动作片 百度网盘 求大奶大屁股的视频 迷奸迷奸快播电影免费欣赏 国语对白影音先锋手机 成人性生活网址 轮里涩涩 实况足球8补丁 全职猎人348 卡索 高清沟厕偷拍 熟女先锋 30p亚洲性交 黑人草亚洲美女大鸡巴 美女美女我要插逼逼18p 偸拍野站视频 全裸日本充气娃娃照片 老女人露脸口交哥必撸 tubi8中国三级 人体艺术芭离 老师孙老头看看你的内部拍的照片 色妹妹丁香社区妞妞 善良的美人妇加强版20 现代女性性交大全 依人22成人综合网 五码视频在线观看 xxxxppppus社区 撸撸管图片 悠悠人体写真艺术 小男孩以妈妈性交视频 WWWCCC212COM 华人色小说 强奸学校学生亚洲图片 女友穿情趣内衣让我操她 qingchunmeinvpeike 人体全裸艺术美女 顶级人体艺术欧美人体艺术 性感丝袜美女图库欧美色图欧美色图 日本母子l乱伦中文字幕 哪里有美貌女子们的性隐私迅雷下载地址 哪里a片视频 零疼痛人体正确使用姿势书 WWWHNYTWLCOM WWWNTLIDUCOM 我和秦青的性福 佐藤穗乃花 少女和爷爷性交 肏丈母娘屁眼 骚妇掰屄图片 正在播放五十路母影音播放 国模莎莎美乳少妇掰开肥鲍露出湿润大尺度私拍 我插的美女好爽啊无约定香甜 吉吉影音无码艳舞 谁有日本美女黄色照网址 svssex 女模爱爱图 百度美女裸体艺术作品 日逼的网站 鸭哥哥影视 男动物色平色 大学生淫荡做爱 美女私处超大胆高清人体艺术图片摄影3 性爱真人自拍 操屄小说视频 大色窝基地之大色鸟 蒙古女人的性欲故事 老人操逼做爱图片 黄色三色片伦理网 亚洲扒衣 激情网站丁香五月狠狠咂色视频 无毒网站北岛玲 A1黄色片magnet 网友自拍情景剧儿子干妈妈 录音精品线播放 妻子与干爹李娜TXT 肛交av网站 青青草冷sm视频 手机看视频不支持s 欧美性爱色尼古 欧美唆鸡巴 43脳ecom 免费片第一次 丰满肉欲少妇p 儿子插完妈妈插妹妹 韩国赤裸做爱 春暖花开之Wc女厕所偷拍系列网站 紧急更新通知magnet 淫姐姐骗了弟弟操她逼 faxmagnet 意外插入妈妈的身体是那部av电影 制服丝袜亚洲艳舞写真影音 96插妹妹sexsex88com 天天拍天天操神马 人狗做爱过程 大炮影院手机在线观看 56人艺术摄影 帅男同的鸡鸡ed2k 苍井空色域迷强 百度久久做爱视频 插菊花综合网好吊日wwwfwy57trcom 美女俄罗妈妈女主 美性中文娱文网22 国产自拍影 人兽与美女xxoo的视频 教师情景日本A片视频 日你屄流水小说 久久撸人人操综合网站 大鸡吧插入妈妈骚逼 外国姨蕾丝水 狼老公吃老婆类奶子爸爸 淫乱鸳鸯 日韩美少女射精视频 高h肉文推荐 母淫网姐姐 色吧影院54occom 日本母子性爱游戏mp4 非非影视成 香港经典三级被动物插 非州大鸡巴淫色网 抽插艺术 撸撸网分类 看看a片国语a片国语 老婆自慰番号 亚洲2014性爱偷拍 深爱五月天丁香 se五月天有声小说 春色图宫 春色12街 春色文学 春色增大 樱井莉亚松岛枫 樱井莉亚美人 小泽玛利亚双通 www点w21w 开心五月天地址 酒色网的最新地址 哪里能看黄片 快播看黄片地址 求黄色小说网站 美女电影 丁香五月天 母息子影院 AV激情伦理 AV女优电影 色哥哥妹妹 新农夫 额尔撸 百度www·taobaoav 兔牙喵喵在线观看影院 经典三级 欧美无码 在线视频 白白让你操 俺去也网色 55we韩国主播 娃玖影院 4280影院 7m视频最最新版 免费剧情漫画 人人摸人操 李月华满清禁宫秘史 全国最大成人视频 裙子福利视频在线观看 亚洲AV AV在线 AV天堂 邪恶少漫画acg邪恶帝 翘臀美女后进式10p视频在线 强奸少妇花心在线视频 小黄视频免费观看在线播放 日本性虐式变态性交电影 日韩白丝护士足交 日本亚欧高情视频 日本一本道官方在线 日本无码老司机 日韩黄色大片 magnet 日本一本加比勒 400部韩国女主播视频 插萝莉影院 猫狗影视 小蛮腰xxmmyy 视频全集 亚洲百部 红楼影院tv 宾馆草肉丝美女 这女的喷奶好牛逼 西瓜影音 大香蕉喷奶 欧美色女郎 隔离老王免费国产在线av手机观看 wwwyese632 簊田在线观看网站 AV里面luxu什么意思 av人妻2015新人 椎名由奈会长 亚洲做好爱免费视频 狼友 国庆 福利 提示:点开黑屏或白屏缓冲五秒 [红包] 福利免费视频 [红包] ht 越南女人做爱视频dvd 下载 pp福利影院 澳门av视频福利 成人 国产偷拍综合福利门秒拍视频 色色的爱免费视屏 国产视频大佬色 免费 徐娘半老伦理片 在线视频执着高品质 咬奶头成人 xiunv225恋夜影院教师 依依亚洲图片去哪里 午马影院午夜 你懂百度资源 周晓琳大西瓜 日本69movies戴套 午夜不卡理论 98影院播在线 avbob官网下载 丁香六月激情 天然素人av面接加勒比 校园贷porn 刘嘉玲8分视频下载 ftp 影音先锋 松下纱荣子 9999撸一撸 广西主播西西 magnet 女仆装自拍美乳福利在线播放-国产自拍 - 怡红院 怡春院 怡红院电影 最爱怡红 女理发师番号 bkfuli影院 五月婷婷六月丁香综合基地 网站升级反问 avxfzy资源网 久久热漫画 男人大战人妻 XXXa片 800av福利视频导航 世界十大禁片 ftp 爱蜜莉灰毛衣三部曲迅雷下载 亚洲av欧美av电影av视频 五月天天堂电影 大香蕉福利小视频在线影院 夫妻影院 福利影院闪现福利 yinjiejieyinyuan 大陆 自拍 偷拍 国产 福利H 大奶美女做爱播放片 ye1378。com 偷拍,自拍AV伦理电影 国产 日韩 伦理聚合 3国产 自拍 欧美 性爱 日本无码日本有码亚洲 www999abaom 高h黄视频 风 月 海 棠 精 品 啪 啪 情 趣 黑 丝 套 装 美 少 妇 高清在线播放-华人-91爱爱 搞搞b电影网 俺播 秋霞微博连接i AV午夜福利手机直播在线观看 偷拍女生洗澡成人网站 4388网站鸭王 色女人偷拍 夜勤病栋橘子 猫咪 黄片 欧美a片磁力链接 magnet 终极监狱高清电影新闻 大乳美女秀美腿视频 国产自拍偷拍av 影音先锋 小湿影 美足vn 最新日韩性爱视频 黄片100不啪啪啪 3p自拍在线 日本成人动漫视频在线播放 一人一碰操视频 xxxchinese国产h自拍 avttnet天堂网2014 无码av在线av av天堂网2019 私人文件夹漫画 一级美容色国产 亚洲色农夫Av 东方影库av无码在线播放 竹内纱里奈诱惑美痴女 夜秀 迪丽热巴三部曲下载 美国午夜综艺节目大全 四虎视频茄子视频 黑人巨勃根 美女吃春药自慰视频 午夜視频,普通用户,邪恶38 月经期的黄色视频裸体交配 自拍偷拍 家庭乱 赵飞燕迅雷下载 下载 影音先锋乱伦强奸在线 se5xxx69 颜射口爆小女神 美女动态图张又黄又色 桃色电影磁力链接 香蕉网大人网 色欲影视狠狠插 任你一操 欧美怡红院大香焦 2青娱乐视频综合在线 苍井空无修50分钟在线 老色哥俺去也 神崎亜里沙 青娱乐755 国模人体蜈蚣 成长影院久久爱人人观看 阿v天堂在线CK 産婦人科 死刑囚 病院 操女人逼视频播放 铃原爱蜜莉在线 贵阳夫妇在线 私拍app 国产自拍第10页 日本r级2019电影在线看 小仙儿有声小说资源站 美国农夫新导航手机版 裸条贷款10g在线观看 佐佐视频 雅恶影院 相奸游戏泽艺 性爱互插阴交视频 新年午夜剧场 小明看看永久免费视频2 香蕉视屏 magnet 绿椅子完整版good电影 美国成人综艺节目磁力链接 瑟瑟影院大香蕉视频 日本性奴隶视频 欧美日本亚洲性爱视频图片 色色哒福利 夭夭色综合区 成人看片趣趣影院 骚女在线播 搜索午夜色色色色色和口交 xxxxxxxxx黄色 AV视频免费观i 美国啪网站福利 王者荣耀caobishipin 邪恶少3d欧美里番工 农夫AV神马枪AV神马影院 日本大妈优女性爱视频 图片视频亚洲伦理片 黄u视频 色站 在线 伦理 偷拍 韩国人妻在线影院 最新日韩av在线 怡红院分站 色琪琪影色 影音先锋 Av3847 很像杨颖的无码av 手机在线2018天堂一本道网 超漂亮美女AV mp4 六年级学生教师性交 w'w'w'x'x'x日本 新谷露影院11411 98午夜影院观看 汤姆影院htt66avtv 贵妇的沉沦女王反转版 九州视频永久地址发布 永不迷路 丝袜电影五朵美女网 0855的BT种子分享中心手机上怎么不能下载 不要按装什么视频靠开流量能看到男女做爱过程 PPPD-642 骑马乳交插乳抽插 JULIA 最后是厉害的 插美女嫩穴 超乳爆乳巨乳影片福利 Q欧美无码 sus 悠欢呀福利视频 成人福利视频手机版 成人av网站 被窝福利视频天上人间 被窝福利九州 ganyuemuyingyuan 野驴福利网址大全导航 强奸强暴真实在线视频网站 在线免费毛片基地 色凌综合 非洲操逼逼视频 6878wao FSET-532 啪啪啪视频网站上去衣图片给我看看你的照片看看你现在在哪里番acg 风流寡妇三级观看 濑亚美莉magnet 无码 54jb 久草在线2017成人免费动漫视频 在线福利gv ckplayer 资源网 SDMT-921 苍老师啪啪啪视频 夜秀live最新v视频在线播放 子宫崩坏系列番号种子 SSSxin视频 操同学妹妹第二弹粉嫩逼微醺脸红-by 海哥 男女啪啪1000粒视频 荷兰性交视频 一七六九b大香蕉在线 小哥在线国产视频 8月亚洲高清唯爱 操小姐小红屄视频 草妞视频在线观看 两只硕大的巨乳涨奶水 亚洲视频大香蕉姐妹 nanrecaobishipin 处女膜磁力链接 下载 6080伦理大尺度视频 午夜福利国产2000 深喉口交资源 无内衣揉胸吸奶视频 欧美AV黄色网站观看 HIMA-009 mp4 A天堂影院2014在线观看 五月天之色婷婷 av蓝导航 奇葩鱼在线 magnet 33KKa路Com 日本风媚娘巨乳无圣光 嘿嘿帝国视频神马 日本小女学生肛交视频中文视频 亚洲影院色妞 水中人体磁力链接 下载 日韩女优偷拍 桃色星期天 www所有强奸电影 美国一级无码aa视频 色妞ppp 美国人与兽性生活手机版 沙发上爆操白嫩小女友在线视频 六度影院最新网址 伦理片essue免费速播 伦理片2012天堂快播 亂倫片 美女操b真人直播视频 伦理片艳午秀表演 美女操逼内射视频 极品色无极影院 金荷娜17部svip视频磁力 人人摸人碰2016 情趣内衣开档福利视频 精品幼女在线视频 极品网红兼职外围女喝高了和粉丝炮友啪啪这逼嫩得没说的 下载 强奸乱伦成人小视频 家政妇波多野结衣 人妖啪啪啪视频 免费大尺度互舔视频 小清新影院体验服 四虎萝莉 很黄很细的av小说 尻女人露屄图 闺蜜双飞10p 性感视频在线 金刚狼vs神奇女侠h版 手机看片永久免费在线观看国产频道 国产在线视频发布地址 youjizz中国少女 亚洲熟妇三级黄 森萝财团视频 91波哥盛世大厦刚下班 黑人做爱插入下面视频 黄片啊啊啊啊嫩女 后入车震在线 夫妻露脸偷窥自拍 伦理伦理制服 放放动漫网在线在线acg琉璃神社 免费试看邪恶影院 涩涩禾 人体艺术伦里 911影院午夜福利 日本尻屁片 被窝影院金瓶梅 久久爱国产自拍 色琪琪伊人色综合 欧美大片h版58部合集在线观看 在线超碰天天 Sasha Grey先锋资源 久久草原在线 ftp 五月天毛片基地 小明看看大香蕉在线观看 4438咱们看不了 8888A片 毛片看看尻逼 爱情3级片网站 美女教师种子下载 mp4 92cncn 国产 AA级黄色视频 在线视频 国产 第一页 宋芝善视频在线 邪恶外国黄色网站 射在高跟鞋上的精子视频 洛天依H magnet迅雷 国产自拍视频青青草 男人射精呻吟视频 日本熟妇性交视屏 奸杀剧情里番 在线观看3D同人里番动画 泡桑拿被干的番号 8844cbcom 秋霞伧理 日韩啪啪视频无码输出 苍老师岛国片在线看 久久人人看 の五十路bd在线观看 欧美h片巨无霸 被偷拍的女主播樱木6 689aaa eee222 性虐待视频日本 xxoo视频免费欧美激烈 saolou 日本125视频jzz7 porno sayuri mikami 明星淫乱亚洲色 美女大肥阴户露阴图 678avi 人体艺术超大胆图集 野外性freexxx 少女裸替艺术网 香港三级片新江山美人影音先锋 干日本女优影音先锋 女人逼生孩子过程图片 刚肏的屄15p 幼女无码电影性爱偷拍自拍 展屄人体 新母子相奸游戏高月幸穗 外国大妈会阴照片 波多野结美图 深圳真实换妻 66电影成人电影 老外的大鸡巴插中国美女 男人人体艺术露阴茎 欧美兽交肛交群交口交双插 强奸虐屄小说 qvod插菊花网 日本欧美乱伦裸图片 小说成人母子 淫色爷爷2 幼女跟大人做爱影院 免费成人无码快播网址 青木纯奈快播 裸体骚夫