+1 to the suggestions that Vladimir raises; I've seen a fair number of
requests  in the field for exactly that

Hans.

On Mon, Nov 19, 2018 at 10:59 AM Vladimir Dzhuvinov <vladi...@connect2id.com>
wrote:

> On 17/11/2018 13:26, Torsten Lodderstedt wrote:
>
> To start with, the AS may use refresh token rotation in combination with 
> automatic revocation in case of detected replay attempts.
>
> How does it work? The AS issues a new refresh token with every refresh and 
> invalidate the old one. This restricts the lifetime of a refresh token. If 
> someone (might be the legit client or an attacker) submits one of the older, 
> invalidated refresh token, the AS might interpret this as a signal indicating 
> token leakage and revoke the valid refresh token as well. We used this 
> technique at Deutsche Telekom since our first OAuth 2.0 implementation back 
> in 2012.
>
> This is a clever solution. Did you experience any false positives, e.g.
> due to HTTP response timeouts on slow / poor connections?
>
> We were also thinking of additionally binding the refresh token to the
> end-user session at the AS / OP:
>
>    - A valid refresh causing the session to be refreshed too
>    - AS / OP logout or session expiration invalidating the refresh token
>
>
> Vladimir
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


-- 
hans.zandb...@zmartzone.eu
ZmartZone IAM - www.zmartzone.eu
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to