From e2326c2770e6cee5803d647f08692dd986a32029 Mon Sep 17 00:00:00 2001 From: Kristina <52878547+Sakurann@users.noreply.github.com> Date: Fri, 8 Dec 2023 16:29:56 -0800 Subject: [PATCH] Apply suggestions from code review --- openid-4-verifiable-credential-issuance-1_0.md | 4 ---- 1 file changed, 4 deletions(-) diff --git a/openid-4-verifiable-credential-issuance-1_0.md b/openid-4-verifiable-credential-issuance-1_0.md index 7a7f7522..40152596 100644 --- a/openid-4-verifiable-credential-issuance-1_0.md +++ b/openid-4-verifiable-credential-issuance-1_0.md @@ -1315,10 +1315,6 @@ Implementations MUST follow [@!BCP195]. Whenever TLS is used, a TLS server certificate check MUST be performed, per [@!RFC6125]. -## - -DPoP or MTLS needs to be recommended because metadata is only partially signed and attacker could do MITM by changing the credential endpoint value as suggested. - # Implementation Considerations ## Claim-based Binding of the Credential to the End-User possessing the Credential {#claim-based-binding}