Skip to content

Commit

Permalink
Expand the security considerations section
Browse files Browse the repository at this point in the history
  • Loading branch information
sandhose committed Jan 17, 2025
1 parent f84428f commit e25fd17
Showing 1 changed file with 6 additions and 0 deletions.
6 changes: 6 additions & 0 deletions proposals/2964-oauth2-profile.md
Original file line number Diff line number Diff line change
Expand Up @@ -241,6 +241,12 @@ For a discussion on alternatives please see [MSC3861]
Since this touches one of the most sensitive part of the API, there are a lot of security considerations to have.

The [OAuth 2.0 Security Best Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-16) IETF draft has many attack scenarios. Many of those scenarios are mitigated by the choices enforced in the client profiles outlined in this MSC.
It explains the following decisions on this profile:

- Using strict redirect URIs validation helps mitigate the risk of open redirection attacks.
- Using the `code` response mode, alongside PKCE mitigates the risk in cases of redirection hijacking.
- Usage of short-lived access tokens, along with rotation of refresh tokens mitigates the impact of leaked tokens.
- Using the system browser to authenticate users lowers the risk of credentials exfiltration by the client.

## Unstable prefix

Expand Down

0 comments on commit e25fd17

Please sign in to comment.