Securing Bearer token in OAuth2.0

Authors

  • Oleksii Sievierinov Kharkiv National University of Radio Electronics, Ukraine
  • Oleh Kholosha Kharkiv National University of Radio Electronics, Ukraine

DOI:

https://doi.org/10.30837/csitic52021231864

Keywords:

Oauth, registration, authorization, security, token, bearer token

Abstract

This article provides information about the bearer token in Oauth2.0. Considered the threats to which the bearer token is exposed in Oauth, suggested recommendations for the safe use of this type of token.

References

Richard Smit, Authentication methods, // Authentication: From Passwords to Public Keys. 2008. C. 190 – 210

RFC 6749, The OAuth 2.0 Authorization Framework [Електронний ресурс]: Режим дoступу: https://tools.ietf.org/html/rfc6749

Власов, А.В., О.В. Сєвєрінов, and О.В. Слиш. Впровадження децентралізованої системи ідентифікації. НТУ «ХПІ», 2020.

Justin Richer Antonio Sanso, OAuth 2 in Action, March 2017 Publisher(s): Manning Publications, ISBN: 9781617293276

Нігель Чепмен, Сlassification of methods of authorization and authentication, // Authentication and Authorization on the Web. 2012. С. 140-153

Ертем Османоглу, Identity management in the modern world, // Identity and Access Management: Business Performance. 2013. С. 97

OAuth protocol specification [Електронний ресурс]: Режим дoступу: https://oauth.net/2/

Downloads

Published

2021-05-30

Issue

Section

RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS