[keycloak-dev] threat model

Bill Burke bburke at redhat.com
Thu Mar 27 13:05:05 EDT 2014


Great doc I finally found:

http://tools.ietf.org/html/rfc6819

After browsing it, I still can't find pros/cons of public vs. 
confidential clients.  Especially when we perform all the other 
validations suggested.
-- 
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com


More information about the keycloak-dev mailing list