Cross-Device Flows: Security Best Current Practice
draft-kasselman-cross-device-security-03
| Document | Type |
Replaced Internet-Draft
(individual)
Expired & archived
|
|
|---|---|---|---|
| Authors | Pieter Kasselman , Daniel Fett , Filip Skokan | ||
| Last updated | 2022-11-21 | ||
| Replaced by | draft-ietf-oauth-cross-device-security | ||
| RFC stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats | |||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Replaced by draft-ietf-oauth-cross-device-security | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes threats against cross-device flows along with near term mitigations, protocol selection guidance and the analytical tools needed to evaluate the effectiveness of these mitigations. It serves as a security guide to system designers, architects, product managers, security specialists, fraud analysts and engineers implementing cross-device flows.
Authors
Pieter Kasselman
Daniel Fett
Filip Skokan
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)