keycloak-scim/server_admin/topics/threat.adoc

9 lines
598 B
Text
Raw Normal View History

2016-05-31 22:00:59 +00:00
== Threat Model Mitigation
2017-08-28 12:50:14 +00:00
This chapter discusses possible security vulnerabilities any authentication server could have and how {project_name}
2016-05-31 22:00:59 +00:00
mitigates those vulnerabilities.
A good list of potential vulnerabilities and what security implementations should do to mitigate them can be found in
2021-05-27 12:29:27 +00:00
the https://datatracker.ietf.org/doc/html/rfc6819[OAuth 2.0 Threat Model] document and its most recent extension https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-15[OAuth 2.0 Security Best Current Practice] put out by the IETF.
2016-05-31 22:00:59 +00:00
Many of those vulnerabilities are discussed here.