Summary

In this chapter, we discussed a lot of important topics relating to the security of your application. We looked at several best practices that should be observed when developing your application. It is important to be aware of all of these attack vectors, and mitigate any opportunities that you can for attackers to infiltrate your application. The best practices listed are good rules to follow, but they are not exhaustive. You should try and implement them all in your application. If you don't, at least have the understanding of the scenario so that you are prepared to deal with any attacks that may follow. We also looked at some of the most common attack scenarios on OAuth 2.0 clients, including methods to mitigate them. There are no ...

Get Mastering OAuth 2.0 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.