Falsifying identity tokens

Resource servers that do not verify the signature of an identity token, or that accept identity tokens that are signed with weak keys, are subject to an impersonation attack.

OpenID Connect Core 1.0 incorporating errata set 1 (OIDC, section 16)


This threat is considered fully mitigated if all the test cases from the following test set succeed.

Back to the threat overview