Plains zebras at sunrise, Mokala National Park, South Africa (© EcoPrint/Shutterstock)
This document describes best current security practice for OAuth 2.0. It updates and extends the threat model and security advice given in
When split-horizon DNS is deployed by a network, certain domain names can be resolved authoritatively by a network-provided DNS resolver.
This specification proposes an additional response secured by JSON Web Token (JWT) for OAuth 2.0 Token Introspection.