This design must be aware of the OAuth2 thread models and mitigation strategies as described in the following resources:
- [OAuth 2.0 Threat Model and Security Considerations][1]
- [OAuth Security][2]
- [Common OAuth2 Vulnerabilities and Mitigation Techniques][3]
- [OAuth1, OAuth2, OAuth...?][4]
A host of vulnerabilities can be removed by pinning redirect_uri
, scope
, response_type
(read: allowed grants for each client) variables in client settings when registering clients (apps).