Proof-of-Possession configuration for access tokens
Whether the use of Proof-of-Possession is required for the resource server
Proof-of-Possession configuration for access tokens