Proof-of-Possession configuration for access tokens
Intended mechanism for Proof-of-Possession
Whether the use of Proof-of-Possession is required for the resource server
Proof-of-Possession configuration for access tokens