Further reading
Refer to the following links for more information on topics covered in this chapter:
- Keycloak User and Session Management: https://www.keycloak.org/docs/latest/server_admin/#user-session-management
- Mutual-TLS Client Authentication: https://www.keycloak.org/docs/latest/server_admin/#advanced-settings
- Token Revocation Endpoint: https://tools.ietf.org/html/rfc7009
- Keycloak Threat Model Mitigation https://www.keycloak.org/docs/latest/server_admin/#compromised-access-and-refresh-tokens
- OAuth 2.0 Threat Model and Security Considerations: https://tools.ietf.org/html/rfc6819
- OAuth 2.0 Security Best Current Practice: https://tools.ietf.org/html/draft-ietf-oauth-security-topicshttps://www.keycloak.org/docs/latest/server_admin/#_account-service