Further reading
Please refer to the following links for more information on the topics that were covered in this chapter:
- OWASP Top 10: https://owasp.org/www-project-top-ten/
- OWASP Cheat Sheet Series: https://cheatsheetseries.owasp.org/index.html
- OAuth 2.0 for Mobile and Native Apps: https://tools.ietf.org/html/rfc8252
- OAuth 2.0 for Browser-Based Apps: https://tools.ietf.org/html/draft-ietf-oauth-browser-based-apps
- OAuth 2.0 Threat Model and Security Considerations: https://tools.ietf.org/html/rfc6819
- OAuth 2.0 Security Best Current Practice: https://tools.ietf.org/html/draft-ietf-oauth-security-topics
- OAuth 2.1: https://tools.ietf.org/html/draft-parecki-oauth-v2-1
Join our community on Discord
Join our community’s Discord space for discussions with the authors and other readers: