Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You are probably familiar with a document called OAuth Threat model.

In that document, refresh token rotation is preferred, but it also addresses the obvious difficulty in clustered environments: https://datatracker.ietf.org/doc/html/rfc6819#section-5.2.2....



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: