!!! Overview
[{$pagename}] is defined is an [Internet Draft] ([https://tools.ietf.org/html/draft-hunt-oauth-pop-architecture-04|https://tools.ietf.org/html/draft-hunt-oauth-pop-architecture-04|target='_blank']])
The [OAuth 2.0] [Bearer Token] specification, as defined in [RFC 6750], allows any party in possession of a [Bearer Token] (a "bearer") to get access to the associated [Protected Resource]. To prevent misuse, [Bearer Token] must to be protected from disclosure in [transit|Data In Transit] and at [rest|Data At Rest].
[{$pagename}] security concept extends [Bearer Token] security and requires the client to demonstrate possession of a [key] when accessing a [Protected Resource].
Some scenarios demand additional security protection whereby a client needs to demonstrate possession of cryptographic keying material when accessing a protected resource. This document motivates the development of the OAuth 2.0 proof-of-possession security mechanism.
[{$pagename}] outlines
* use cases requiring stronger security protection:
* Describes Security and Privacy Threats
* proposes different ways to mitigate those threats
* lists requirements of the Architecture.
* Discusses Threat Mitigation
* Outlines an architecture for a solution that builds on top of the existing OAuth 2.0 framework
[{$pagename}] is a [Proof-of-Possession] Architecture for [OAuth 2.0].
[Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)] ([RFC 7800]) describes how a [JSON Web Token] ([JWT]) can declare that the presenter of the [JWT] possesses a particular [proof-of-Possession] ([PoP]) key and that the recipient can [cryptographically|cryptography] confirm [proof-of-Possession] of the key by the presenter.
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]