b81233a4af
Closes keycloak/keycloak#24705 Signed-off-by: Joshua Sorah <jsorah@gmail.com>
5 lines
388 B
Text
5 lines
388 B
Text
|
|
[[mitigating_security_threats]]
|
|
== Mitigating security threats
|
|
|
|
Security vulnerabilities exist in any authentication server. See the Internet Engineering Task Force's (IETF) https://datatracker.ietf.org/doc/html/rfc6819[OAuth 2.0 Threat Model] and the https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics[OAuth 2.0 Security Best Current Practice] for more information.
|