@techreport{ietf-oauth-security-topics-25, number = {draft-ietf-oauth-security-topics-25}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-oauth-security-topics/25/}, author = {Torsten Lodderstedt and John Bradley and Andrey Labunets and Daniel Fett}, title = {{OAuth 2.0 Security Best Current Practice}}, pagetotal = 59, year = 2024, month = feb, day = 8, abstract = {This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in {[}RFC6749{]}, {[}RFC6750{]}, and {[}RFC6819{]} to incorporate practical experiences gathered since OAuth 2.0 was published and covers new threats relevant due to the broader application of OAuth 2.0. It further deprecates some modes of operation that are deemed less secure or even insecure.}, }