keycloak-scim/server_admin/topics/threat/compromised-codes.adoc
Brian Dooley 2a82132ff5 KEYCLOAK-15790 Security Threats rewrite (#57)
* KEYCLOAK-15790 Security Threats rewrite

* KEYCLOAK-15790 Post feedback changes
2021-09-21 08:58:46 +02:00

8 lines
662 B
Text

=== Compromised Authorization Code
For the xref:con-oidc-auth-flows_{context}[OIDC Auth Code Flow], {project_name} generates a cryptographically strong random value for its authorization codes. An authorization code is used only once to obtain an access token.
On the <<_timeouts, timeouts page>> in the Admin Console, you can specify the length of time an authorization code is valid. Ensure that the length of time is less than 10 seconds, which is long enough for a client to request a token from the code.
You can also defend against leaked authorization codes by applying <<_proof-key-for-code-exchange, Proof Key for Code Exchange (PKCE)>> to clients.