OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer

This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows to detect replay attacks with access and refresh tokens.