Summary
In this chapter, we discussed a lot of important topics relating to the security of your application. We looked at several best practices that should be observed when developing your application. It is important to be aware of all of these attack vectors, and mitigate any opportunities that you can for attackers to infiltrate your application. The best practices listed are good rules to follow, but they are not exhaustive. You should try and implement them all in your application. If you don't, at least have the understanding of the scenario so that you are prepared to deal with any attacks that may follow. We also looked at some of the most common attack scenarios on OAuth 2.0 clients, including methods to mitigate them. There are no silver bullets when it comes to security. All that we can do is try our best to plug any holes, and be vigilant in this effort as our application grows and evolves. In the next chapter, we will take a dedicated look at mobile applications and how they...