keycloak-scim/docs/documentation/server_admin/topics/threat.adoc

5 lines
359 B
Text
Raw Normal View History

2016-05-31 22:00:59 +00:00
2021-02-19 19:10:41 +00:00
== Mitigating security threats
2016-05-31 22:00:59 +00:00
Security vulnerabilities exist in any authentication server. See the Internet Engineering Task Force's (IETF) https://datatracker.ietf.org/doc/html/rfc6819[OAuth 2.0 Threat Model] and the https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-15[OAuth 2.0 Security Best Current Practice] for more information.