Skip to content

Commit 4890682

Browse files
authored
Update refresh-token-rotation.md
1 parent 73b9c70 commit 4890682

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/tokens/concepts/refresh-token-rotation.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ For example, consider the following scenario:
5656

5757
This protection mechanism works regardless of whether the legitimate client or the malicious client is able to exchange **Refresh Token 1** for a new token pair before the other. As soon as reuse is detected, all subsequent requests will be denied until the user re-authenticates. When reuse is detected, Auth0 captures detected reuse events (such as `ferrt` indicating a failed exchange) in logs. This can be especially useful in conjunction with Auth0’s log streaming capabilities.
5858

59-
Another example is where the malicious client steals the Refresh Token before the legitimate client attempts to use it. In this case the malicious client’s access would be limited because the Refresh Token will be revoked as soon as the legitimate client tries to use the same Refresh Token, as shown in the following diagram:
59+
Another example is where the malicious client steals Refresh Token 1 and successfully uses it to acquire an Access Token before the legitimate client attempts to use Refresh Token 1. In this case, the malicious client’s access would be short-lived because Refresh Token 2 (or any subsequently issued RTs) is automatically revoked when the legitimate client tries to use Refresh Token 1, as shown in the following diagram:
6060

6161
![Reuse Detection](/media/articles/tokens/reuse-detection2.png)
6262

0 commit comments

Comments
 (0)