Skip to content

Commit

Permalink
Expand the security considerations section
Browse files Browse the repository at this point in the history
  • Loading branch information
sandhose committed Jan 17, 2025
1 parent f84428f commit c57be5e
Showing 1 changed file with 8 additions and 2 deletions.
10 changes: 8 additions & 2 deletions proposals/2964-oauth2-profile.md
Original file line number Diff line number Diff line change
Expand Up @@ -238,9 +238,15 @@ For a discussion on alternatives please see [MSC3861]

## Security considerations

Since this touches one of the most sensitive part of the API, there are a lot of security considerations to have.
Since this touches one of the most sensitive parts of the API, there are a lot of security considerations to keep in mind.

The [OAuth 2.0 Security Best Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-16) IETF draft has many attack scenarios. Many of those scenarios are mitigated by the choices enforced in the client profiles outlined in this MSC.
The [OAuth 2.0 Security Best Practice](https://tools.ietf.org/html/draft-ietf-oauth-security-topics-16) IETF draft outlines many potential attack scenarios. Many of these scenarios are mitigated by the choices enforced in the client profiles outlined in this MSC.
It motivates the following decisions in this profile:

- Using strict redirect URIs validation helps mitigate the risk of open redirection attacks.
- Using the `code` response mode, alongside PKCE mitigates the risk in cases of redirection hijacking.
- Usage of short-lived access tokens, along with rotation of refresh tokens mitigates the impact of leaked tokens.
- Using the system browser to authenticate users lowers the risk of credentials exfiltration by the client.

## Unstable prefix

Expand Down

0 comments on commit c57be5e

Please sign in to comment.