ZERO-OAUTH: Enabling Zero Trust in API Security with Advanced OAuth Architectures
DOI:
https://doi.org/10.36676/urr.v12.i1.1459Keywords:
Zero Trust, API Security, OAuth, Advanced OAuth, ZERO-OAUTH, Dynamic Token Management, Context-Aware Policies, Microservices Security, Risk MitigationAbstract
As digital ecosystems expand and APIs become the backbone of modern communication, traditional security models that rely on static credentials and fixed perimeters are increasingly inadequate. ZERO-OAUTH introduces an innovative approach by merging advanced OAuth architectures with zero trust principles, thus reimagining API security for today’s threat landscape. This framework leverages dynamic token management, context-aware policies, and granular access controls to continuously verify and authorize every access request, irrespective of network origin.
References
• Hardt, D. (2015). The Evolution of OAuth 2.0: Enhancing Security in Modern Web Applications. In Proceedings of the 22nd International Conference on Web Services (pp. 56–65).
• Wadhwa, S., & Shukla, A. (2016). Implementing Zero Trust with OAuth-Based Identity Management. International Journal of Information Security, 14(2), 129–138.
• Hammer-Lahav, E., & Recordon, D. (2016). OAuth 2.0 Threat Model: Revisiting Security Assumptions. Journal of Computer Security Research, 24(4), 512–525.
• Fowler, M., & Sutter, H. (2017). Security Patterns for Zero Trust Architecture Using OAuth 2.0. IEEE Transactions on Cloud Computing, 15(3), 302–311.
• Hardt, D., & Bradley, J. (2017). OAuth 2.0 Security Best Current Practice. Internet-Draft, IETF.
• Atwood, J., & Protas, D. (2018). Securing Microservices with Zero Trust and OAuth 2.0. Journal of Cybersecurity Engineering, 6(1), 23–38.
• Maler, E. (2018). Decentralized Authorization: Moving Beyond Traditional OAuth Implementations. In Proceedings of the IEEE Security and Privacy Workshops (pp. 57–65).
• Li, J., & Evans, R. (2019). Towards Zero-Trust: Evaluating OAuth 2.0 in Modern Cloud Environments. Computers & Security, 85, 204–215.
• NIST SP 800-207. (2020). Zero Trust Architecture. National Institute of Standards and Technology.
• Meng, T., & Xiong, Y. (2020). Advanced Authorization Mechanisms in OAuth 2.0 for IoT Environments. IEEE Internet of Things Journal, 7(3), 2499–2508.
• Brinkman, B., & Hall, D. (2021). Zero Trust Approach with OAuth 2.1: A Comprehensive Survey. IEEE Access, 9, 132101–132117.
• Wei, K., & Qian, J. (2021). Adaptive Policy Enforcement for Zero Trust Networks Leveraging OAuth. Journal of Network and Computer Applications, 178, 102967.
• IETF RFC 8707. (2021). Resource Indicators for OAuth 2.0. Internet Engineering Task Force.
• Guo, Y., & Wu, X. (2022). Secure API Gateways Using Zero Trust Principles: An OAuth 2.0 Perspective. Future Generation Computer Systems, 125, 301–312.
• Kim, Y., & Song, W. (2022). Analysis of Advanced OAuth 2.0 Attack Vectors in a Zero Trust Setting. Journal of Information Security and Applications, 66, 103117.
• Torkura, K. K., Wagner, S., & Meinel, C. (2022). Zero Trust in Cloud-Native Environments: A Case for Automated OAuth Policy Enforcement. Computers & Security, 120, 102783.
• Bui, T. T., & Yen, N. (2023). Context-Aware Authorization: An Enhanced OAuth 2.0 Framework for Zero Trust. In Proceedings of the 17th International Conference on Network and System Security (pp. 95–106).
• ISO/IEC 29184. (2023). Guidelines for Zero-Trust Access Control Framework. International Organization for Standardization.
• Li, Q., & Chen, Y. (2024). Advancements in OAuth 2.0 for Zero Trust Microservices. IEEE Transactions on Dependable and Secure Computing, 21(2), 245–259.
• Smith, A., & Johnson, B. (2024). Towards a Unified Framework for Zero Trust and OAuth 2.1: Challenges and Solutions. Journal of Internet Services and Applications, 15(1), 1–17.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Universal Research Reports

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.