This is pretty much impossible to answer without a fuller understanding of your application and security threat analysis.
EH
From: oz-pr...@googlegroups.com [mailto:oz-pr...@googlegroups.com]
On Behalf Of Jonathan Barronville
Sent: Monday, December 10, 2012 6:20 AM
To: oz-pr...@googlegroups.com
Subject: Implementation.
Hey, guys.
I am building an application that will be backed by OAuth v2. After building the entire implementation (following the standard from line 1), I am now seeing the drawbacks that Eran has been mentioning. I would like to know what I need add on top of the OAuth v2 server I've implemented in order to really make it more-or-less secure (until the oz protocol is released, of course). I know what I am supposed to know in terms of computer science, but I am no security expert.
Can anyone help me?
Thanks in advance!
Have a good one!
--
--