keycloak-scim/topics/threat.adoc
Bill Burke 1dc81011dc threat
2016-05-31 18:00:59 -04:00

8 lines
448 B
Text
Executable file

== Threat Model Mitigation
This chapter discusses possible security vulnerabilities any authentication server could have and how {{book.project.name}}
mitigates those vulnerabilities.
A good list of potential vulnerabilities and what security implementations should do to mitigate them can be found in
the http://tools.ietf.org/html/rfc6819[OAuth 2.0 Threat Model] document put out by the IETF.
Many of those vulnerabilities are discussed here.