...
| Code Block | ||
|---|---|---|
| ||
TBD |
Compliant Solution
In this compliant solution the application
| Code Block | ||
|---|---|---|
| ||
TBD |
Risk Assessment
...
Rule | Severity | Likelihood |
|---|
Detectable | Repairable | Priority | Level |
|---|---|---|---|
DRD26-J | Medium | Probable |
No | No |
P4 |
L3 |
Automated Detection
Bibliography
| [Chen 2014] | OAuth Demystified for Mobile Application Developers |
| [IETF OAuth1.0a] | Internet Engineering Task Force (IETF). OAuth core 1.0 revision a. http://oauth.net/core/1.0a/. |
| [IETF OAuth2.0] | Internet Engineering Task Force (IETF). The OAuth 2.0 authorization framework. http://tools.ietf.org/html/rfc6749. |
...
...