RE: Implementation.

98 views
Skip to first unread message

Eran Hammer

unread,
Dec 10, 2012, 10:42:12 AM12/10/12
to Jonathan Barronville, oz-pr...@googlegroups.com

This is pretty much impossible to answer without a fuller understanding of your application and security threat analysis.

 

EH

 

From: oz-pr...@googlegroups.com [mailto:oz-pr...@googlegroups.com] On Behalf Of Jonathan Barronville
Sent: Monday, December 10, 2012 6:20 AM
To: oz-pr...@googlegroups.com
Subject: Implementation.

 

Hey, guys.

 

I am building an application that will be backed by OAuth v2. After building the entire implementation (following the standard from line 1), I am now seeing the drawbacks that Eran has been mentioning. I would like to know what I need add on top of the OAuth v2 server I've implemented in order to really make it more-or-less secure (until the oz protocol is released, of course). I know what I am supposed to know in terms of computer science, but I am no security expert.

Can anyone help me?

Thanks in advance!

 

Have a good one!

 

--

--
 
 

Reply all
Reply to author
Forward
Message has been deleted
0 new messages