2016-05-31 22:00:59 +00:00
|
|
|
== Threat Model Mitigation
|
|
|
|
|
2017-08-28 12:50:14 +00:00
|
|
|
This chapter discusses possible security vulnerabilities any authentication server could have and how {project_name}
|
2016-05-31 22:00:59 +00:00
|
|
|
mitigates those vulnerabilities.
|
|
|
|
A good list of potential vulnerabilities and what security implementations should do to mitigate them can be found in
|
2017-09-05 07:49:24 +00:00
|
|
|
the https://tools.ietf.org/html/rfc6819[OAuth 2.0 Threat Model] document put out by the IETF.
|
2016-05-31 22:00:59 +00:00
|
|
|
Many of those vulnerabilities are discussed here.
|
|
|
|
|