Hi,
does someone know, how KeyCloak handles the Secure Deletion of access tokens in technical detail? I know how this flow works, but i would like to know the steps in detail with description of the cryptographic functionality.
How is the deletion of access tokens realized?
I know about the Flow with tagging the access token and the Cleanup Process, but i need this informations in detail.
A concrete link to a possibly existing documentation would be very helpful.
Thanks in advance
Memet