Cross-Device Flows: Security Best Current Practice
draft-kasselman-cross-device-security-03
Document | Type |
Replaced Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Pieter Kasselman , Daniel Fett , Filip Skokan | ||
Last updated | 2022-11-21 | ||
Replaced by | draft-ietf-oauth-cross-device-security | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Replaced by draft-ietf-oauth-cross-device-security | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes threats against cross-device flows along with near term mitigations, protocol selection guidance and the analytical tools needed to evaluate the effectiveness of these mitigations. It serves as a security guide to system designers, architects, product managers, security specialists, fraud analysts and engineers implementing cross-device flows.
Authors
Pieter Kasselman
Daniel Fett
Filip Skokan
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)