In a scenario where a user's access token is compromised, the OAuth implementation should allow ________ to mitigate the risk.

  • Token Refresh
  • Password Change
  • Two-Factor Authentication
  • Token Revocation
The correct option is "Token Revocation." If a user's access token is compromised, the OAuth implementation should support revoking or invalidating the token to prevent unauthorized access. This is a crucial security measure to mitigate the risk of unauthorized access.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *