...
Warning | ||
---|---|---|
| ||
This guideline is under construction. |
Noncompliant Code Example
This noncompliant code example shows an application that
Code Block | ||
---|---|---|
| ||
TBD |
Compliant Solution
In this compliant solution the application
Code Block | ||
---|---|---|
| ||
TBD |
Risk Assessment
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
DRD28-J |
|
|
|
|
|
Automated Detection
Bibliography
[Chen OAuth 2014] | OAuth Demystified for Mobile Application Developers |
Internet Engineering Task Force (IETF). OAuth core 1.0 revision a. http://oauth.net/core/1.0a/. | |
Internet Engineering Task Force (IETF). The OAuth 2.0 authorization framework. http://tools.ietf.org/html/rfc6749. |
...