Securing Bearer token in OAuth2.0
DOI:
https://doi.org/10.30837/csitic52021231864Keywords:
Oauth, registration, authorization, security, token, bearer tokenAbstract
This article provides information about the bearer token in Oauth2.0. Considered the threats to which the bearer token is exposed in Oauth, suggested recommendations for the safe use of this type of token.
References
Richard Smit, Authentication methods, // Authentication: From Passwords to Public Keys. 2008. C. 190 – 210
RFC 6749, The OAuth 2.0 Authorization Framework [Електронний ресурс]: Режим дoступу: https://tools.ietf.org/html/rfc6749
Власов, А.В., О.В. Сєвєрінов, and О.В. Слиш. Впровадження децентралізованої системи ідентифікації. НТУ «ХПІ», 2020.
Justin Richer Antonio Sanso, OAuth 2 in Action, March 2017 Publisher(s): Manning Publications, ISBN: 9781617293276
Нігель Чепмен, Сlassification of methods of authorization and authentication, // Authentication and Authorization on the Web. 2012. С. 140-153
Ертем Османоглу, Identity management in the modern world, // Identity and Access Management: Business Performance. 2013. С. 97
OAuth protocol specification [Електронний ресурс]: Режим дoступу: https://oauth.net/2/