Insecure auth scheme

owasp:api2:2019-auth-insecure-schemes

Rule Severity:

Medium

Ensure endpoints specify a strong authentication scheme.
This rule applies at the API Specification level (OAS/Swagger).
Endpoints with weak authentication mechanisms are at risk of being breached. Examples of these include OAuth 1 or Microsoft Negotiate Authentication Protocol.

1. How to Identify with Example Scenario

Find the text in bold to identify issues such as these in API specifications

securitySchemes: authType: # arbitrary name for the security scheme type: http scheme: oauth

2. How to Identify with Example Scenario

Find the text in bold to identify issues such as these in API specifications

securitySchemes: authType: # arbitrary name for the security scheme type: http scheme: negotiate

1. How to Resolve with Example Scenario

Find the text in bold to identify issues such as these in API specifications

securitySchemes: authType: # arbitrary name for the security scheme type: http scheme: bearer

2. How to Resolve with Example Scenario

Modify the text in bold to resolve issues such as these in API specifications