About 529,000 results
Open links in new tab
  1. Mutual TLS Sender Constrained Access Tokens - Curity

    Jun 17, 2025 · Mutual TLS Sender Constrained Access Tokens provide a robust method for enhancing the security of OAuth 2.0-based authorization by binding the access token to the client's TLS …

  2. Sender-constrained Access Tokens mTLS vs DPoP - Cloudentity

    May 12, 2023 · The article discusses the importance of implementing sender-constrained access tokens through methods such as mTLS and DPoP. It compares the pros and cons of each method and …

  3. Tightening Bearer Token Authentication with Proof-of-Possession Tokens

    Nov 15, 2023 · A solution to this problem is constraining the tokens issued by authorization server to clients (sender-constrained tokens) so only the entity/client to whom a token was issued can use the …

  4. Certificate-Bound Access Tokens: Implementing Sender Constraints in ...

    Feb 18, 2025 · Learn how the sender constraining mechanism ties token validity to the client’s authenticated TLS session.

  5. OAuth2 - OWASP Cheat Sheet Series

    It also allows the Authorization Server to sender-constrain the issued tokens. The Authorization and Resource Servers are using mechanisms for sender-constraining access tokens to prevent token …

  6. OAuth 2.0 DPoP-bound Access Tokens :: Spring Security

    Access tokens that are sender-constrained via DPoP stand in contrast to the typical bearer token, which can be used by any client in possession of the access token. DPoP introduces the concept of a …

  7. Certificate-bound access tokens

    Certificate-bound access tokens (sometimes also called Mutual TLS sender-constrained tokens) are bound to the underlying mutual TLS connection between the client and the authorization server (like …

  8. RFC 9700: Best Current Practice for OAuth 2.0 Security

    Jan 1, 2025 · It introduces new requirements beyond those defined in existing specifications such as OAuth 2.0 [RFC6749] and OpenID Connect [OpenID.Core] and deprecates some modes of …

  9. Sender Constraining - Auth0

    Sender constraining ensures that the client application presenting the access token to a resource server is the valid owner of the access token. If the client application is not the valid owner of the access …

  10. OAuth best practices: We read RFC 9700 so you don’t have to

    Mar 6, 2025 · OAuth 2.0 typically uses redirect URIs to send users back to the application after they grant or deny access. However, attackers can manipulate redirect URIs to steal authorization codes …