From 456566e17f12f4c917c8f4dc4d48dc55917ebc26 Mon Sep 17 00:00:00 2001 From: crimson Date: Tue, 16 Jan 2024 13:37:53 +0100 Subject: [PATCH] Editorial --- draft-ietf-ace-key-groupcomm.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/draft-ietf-ace-key-groupcomm.md b/draft-ietf-ace-key-groupcomm.md index 508463d..3523206 100644 --- a/draft-ietf-ace-key-groupcomm.md +++ b/draft-ietf-ace-key-groupcomm.md @@ -1186,7 +1186,7 @@ The handler expects a request with payload formatted as a CBOR map, which MUST c * 'get_creds', whose value is encoded as in {{gid-post}} with the following modifications. - - The arrays 'role\_filter' and 'id\_filter' MUST NOT both be empty, i.e., in CBOR diagnostic notation: \[ bool, \[ \], \[ \] \]. If the 'get_creds' parameter has such a format, the request MUST be considered malformed, and the KDC MUST reply with a 4.00 (Bad Request) error response. + - The arrays 'role\_filter' and 'id\_filter' MUST NOT both be empty, i.e., in CDDL notation: \[ bool, \[ \], \[ \] \]. If the 'get_creds' parameter has such a format, the request MUST be considered malformed, and the KDC MUST reply with a 4.00 (Bad Request) error response. Note that a group member can retrieve the authentication credentials of all the current group members by sending a GET request to the same KDC resource instead (see {{sec-key-retrieval-all}}).