Bearer tokens are reusable. That’s the problem.

In Quarkus 3.32 you can now implement a custom DPoPNonceProvider and stop OAuth token replay attacks properly.

I built a full end-to-end example with:
- DPoP-bound tokens
- Nonce challenge-response
- Replay protection
- Keycloak Dev Services

Full walkthrough:
https://www.the-main-thread.com/p/quarkus-3-32-dpop-nonce-provider-java-replay-protection

#Quarkus #Java #OAuth2 #DPoP #APISecurity

Wednesday Links - Edition 2026-03-11

Java 26 for DevOps (2 min)☕ https://inside.java/2026/03/02/jdk-26-rn-ops/ HTTP Client Updates in...

DEV Community
foojay – a place for friends of OpenJDK

foojay is the place for all OpenJDK Update Release Information. Learn More.

foojay
DPoP is one of the most exciting developments in the IAM (Identity and Access Management) space in recent years. Yet many backend developers either have not heard of it or are unsure what it actually changes. In this article, I will break down what DPoP is, what problem it solves, and walk through a working…...
#dpop #iam #keycloak #quarkus
https://foojay.io/today/dpop-what-it-is-how-it-works-and-why-bearer-tokens-arent-enough/
foojay – a place for friends of OpenJDK

foojay is the place for all OpenJDK Update Release Information. Learn More.

foojay
Use client assertions in ASP.NET Core using OpenID Connect, OAuth DPoP and OAuth PAR

This post looks at implement client assertions in an ASP.NET Core application OpenID Connect client using OAuth Demonstrating Proof of Possession (DPoP) and OAuth Pushed Authorization Requests (PAR…

Software Engineering
Implement a secure MCP server using OAuth DPoP and Duende identity provider

Code: This post demonstrates how an ASP.NET Core application can connect to a secure MCP server using OpenID Connect and OAuth. Both applications use Duende IdentityServer as the identity provider.…

Software Engineering

#Keycloak 26.4 is out with a lot of new capabilities for your self-hosted #iam:

* #Passkeys
* Client Authentication to use #SPIFFE or #Kubernetes service account tokens
* Simplified deployments across multiple availability zones to boost availability.
* #FAPI 2 Final
* #DPoP: The OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer (DPoP) is now fully supported.

Read more the full release announcement: https://www.keycloak.org/2025/09/keycloak-2640-released

Keycloak 26.4.0 released

Passkeys integration (supported) * FAPI 2 Final (supported) * DPoP (supported) * FIPS 140-2 mode now supports EdDSA

Keycloak
Inspired by a question from @thisismissem.social, I wrote up a document describing how to apply DPoP (RFC9449) to the OAuth Device Flow (RFC8628).

https://datatracker.ietf.org/doc/draft-parecki-oauth-dpop-device-flow/
Emelia 👸🏻 (@[email protected])

23.2K Posts, 1.4K Following, 2.33K Followers · Tech Princess 👸🏻 Feminist Politicker 💁🏻‍♀️ Fashionable Woman 💋 Tooling Witch 🛠 🚀 Founder of https://unobvious.technology Pro-Unions 💪🏻 Trans & Queer 🏳️‍⚧️🏳️‍🌈 I currently work on Moderation and Trust & Safety tooling for the Fediverse. Contributor to #Mastodon & other projects. You've probably used code I’ve written. Worked on the Fedi in 2018. Berliner on New York time. Advisor to IFTAS (https://about.iftas.org) Bluesky: @[email protected]

Hachyderm.io
Experimental alternative flow for OAuth First-Party Applications

This post looks at an alternative way of implementing a native app authentication and authorization. At present, a web browser is used to implement authentication of native applications when using …

Software Engineering