Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to...| IETF Datatracker
This document defines a "problem detail" as a way to carry machine- readable details of errors in a HTTP response to avoid the need to define new error response formats for HTTP APIs.| IETF Datatracker
At some point when implementing HTTP APIs, just logging “error” and returning an empty response doesn’t cut it anymore. Good practise with REST APIs suggests returning a suitable HTTP status code, i.e. something other than 200 OK.| paul.totterman.name