<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-oauth-cross-device-security" target="https://datatracker.ietf.org/doc/html/draft-ietf-oauth-cross-device-security-03">
   <front>
      <title>Cross-Device Flows: Security Best Current Practice</title>
      <author initials="P." surname="Kasselman" fullname="Pieter Kasselman">
         <organization>Microsoft</organization>
      </author>
      <author initials="D." surname="Fett" fullname="Daniel Fett">
         <organization>Authlete</organization>
      </author>
      <author initials="F." surname="Skokan" fullname="Filip Skokan">
         <organization>Okta</organization>
      </author>
      <date month="October" day="22" year="2023" />
      <abstract>
	 <t>   This document describes threats against cross-device flows along with
   near term mitigations, protocol selection guidance, and the
   analytical tools needed to evaluate the effectiveness of these
   mitigations.  It serves as a security guide to system designers,
   architects, product managers, security specialists, fraud analysts
   and engineers implementing cross-device flows.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-cross-device-security-03" />
   
</reference>
