BCP_4_10

Misuse of Stolen Access Tokens

Access tokens can be stolen by an attacker in various ways. Authorization servers therefore SHOULD ensure that access tokens are sender-constrained and audience-restricted.

OAuth 2.0 Security Best Current Practice (draft 25) (SecBCP, section 4.10)

Mitigations

This threat is considered fully mitigated if all the test cases from the following test set succeed.

The impact factor is a measure that indicates how important a given countermeasure is towards mitigating a threat.

Back to the threat overview