Skip to content
STANDARD

Dynamic Client Registration (RFC 7591/7592) — Primer

Dynamic Client Registration (RFC 7591/7592) standardizes how OAuth clients register and later manage their metadata via a protected endpoint.

Visual representation of Dynamic Client Registration (RFC 7591/7592) standard
← All standards

Why it matters

Standards reduce risk and vendor lock‑in. We implement this spec across our Studios and runtime so policy is portable.

Where it’s enforced

  • Gateway: pre‑execution gating (plan/schema pins, params/egress)
  • Shield: inline budgets/stream caps/content checks
  • PDP: decisions with constraints/obligations/TTL
  • IdP: passports, token exchange, consent/DPoP

How it works (high level)

RFC 7591/7592 specify dynamic registration and management. Clients POST metadata (optionally with a software_statement) to /register, receive client_id (and secret) plus a registration_access_token and registration_client_uri for subsequent GET/PATCH/DELETE (7592).

POST /register
{
  "redirect_uris": ["https://app.example.com/cb"],
  "grant_types": ["authorization_code"],
  "response_types": ["code"],
  "token_endpoint_auth_method": "tls_client_auth",
  "software_statement": "eyJ..."
}
mermaid
sequenceDiagram
  participant Client
  participant AS as Authorization Server
  Client->>AS: POST /register (metadata)
  AS-->>Client: 201 { client_id[, client_secret] }
  Client->>AS: (7592) GET/PATCH/DELETE /register/{client_id}
← OAuth mTLS (RFC 8705)
All standards
OpenID AuthZEN →