Skip to main content

Cross-Device Flows: Security Best Current Practice

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Pieter Kasselman , Daniel Fett , Filip Skokan
Last updated 2022-11-21
Replaced by draft-ietf-oauth-cross-device-security
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-oauth-cross-device-security
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This document describes threats against cross-device flows along with near term mitigations, protocol selection guidance and the analytical tools needed to evaluate the effectiveness of these mitigations. It serves as a security guide to system designers, architects, product managers, security specialists, fraud analysts and engineers implementing cross-device flows.


Pieter Kasselman
Daniel Fett
Filip Skokan

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)