This message was deleted.
# general
m
This message was deleted.
m
Hello Domski, btw the fosite example is really outdated surprised you got it running! Fosite respects the OAuth 2.0 Threat Model and Security Considerations by the IETF, specifically: • Opaque access tokens see full doc
I assume that I just need to build an endpoint to provide the public keys?
correct I would recommend you use Ory Hydra where all of this has been built, implemented and tested for many years by many organisations - unless you have a really special use case that is not solvable with Hydra.