diff --git a/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs b/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs index 2ff231b3..e3e91c15 100644 --- a/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs +++ b/src/OpenIddict.Client.SystemIntegration/OpenIddictClientSystemIntegrationHandlers.cs @@ -794,8 +794,8 @@ public static partial class OpenIddictClientSystemIntegrationHandlers } /// - /// Contains the logic responsible for redirecting the Windows protocol activation - /// to the instance that initially started the authentication demand, if applicable. + /// Contains the logic responsible for redirecting the protocol activation to + /// the instance that initially started the authentication demand, if applicable. /// Note: this handler is not used when the OpenID Connect request is not a protocol activation. /// public sealed class RedirectProtocolActivation : IOpenIddictClientHandler @@ -919,9 +919,9 @@ public static partial class OpenIddictClientSystemIntegrationHandlers Debug.Assert(!string.IsNullOrEmpty(context.Nonce), SR.GetResourceString(SR.ID4019)); - // Ensure the authentication demand is tracked by the OpenIddict client Windows marshal - // and resolve the corresponding request forgery protection. If it can't be found, this may - // indicate a session fixation attack: in this case, reject the authentication demand. + // Ensure the authentication demand is tracked by the OpenIddict client system integration + // marshal and resolve the corresponding request forgery protection. If it can't be found, + // this may indicate a session fixation attack: in this case, reject the authentication demand. if (!_marshal.TryGetRequestForgeryProtection(context.Nonce, out string? protection)) { context.Reject(