Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAE.IF-RFC6819 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2017-12-13 | ÃÑ ÆäÀÌÁö | 81 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | °ø°³ ÀÎÁõ 2.0 À§Çù ¸ðµ¨°ú º¸¾È °í·Á »çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | OAuth 2.0 Threat Model and Security Considerations | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº ´ÙÀ½°ú °°Àº »çÇ×À» Á¦°øÇÑ´Ù.
— À§Çù ¸ðµ¨ÀÌ »ý¼ºµÉ ¶§ÀÇ °¡Á¤°ú ¹üÀ§¸¦ ¹®¼È — °ø°³ ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ ¼³Ä¡µÈ º¸¾È ±â´ÉµéÀÌ ¾î¶² Àǵµ·Î °ø°ÝÀ» ¾àÈÇÏ´ÂÁö¸¦ ±â¼ú — °ø°³ ÀÎÁõ¿¡ ´ëÇÑ Á¾ÇÕÀûÀÎ À§Çù ¸ðµ¨À» Á¦½ÃÇϰí, Á¦½ÃÇÑ À§Çù ¸ðµ¨µéÀ» ¾àÈÇÏ´Â °³º°Àû ¹æ¾È¿¡ ´ëÇÑ ¼³¸í |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
The standard contains the following content:
— Documents any assumptions and scope considered when creating the threat model. — Describes the security features built into the OAuth protocol and how they are intended to thwart attacks. — Gives a comprehensive threat model for OAuth and describes the respective countermeasures to thwart those threats. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|