This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in
This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in