Authentication Security Best Practices

(4 reviews)

access-tokens-oauth2-cleartext

general > access-tokens-oauth2-cleartext


Guidance

Access tokens from authorization code grant flow are transported in the clear over an unencrypted channel.
Attackers can easily intercept API calls and retrieve the unencrypted tokens. They can then use the tokens to make
other API calls.

Applies to Operation

Constraint

Type: Declarative Validation

Reviews

TypeRuleset
OrganizationMuleSoft
Published by
MuleSoft Organization
Published onApr 25, 2022
Asset overview

Asset versions for 1.0.x

Asset versions
VersionActions
1.0.0