RFC 6750 - The OAuth 2.0 Authorization Framework: Bearer Token Usage
Published: October 2012
Status: Standards Track
Authors: M. Jones (Microsoft), D. Hardt (Independent)
Abstract
This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport.
Table of Contents
- 1. Introduction
- 1.1 Notational Conventions
- 1.2 Terminology
- 1.3 Overview
- 2. Authenticated Requests
- 2.1 Authorization Request Header Field
- 2.2 Form-Encoded Body Parameter
- 2.3 URI Query Parameter
- 3. The WWW-Authenticate Response Header Field
- 3.1 Error Codes
- 4. Example Access Token Response
- 5. Security Considerations
- 5.1 Security Threats
- 5.2 Threat Mitigation
- 5.3 Summary of Recommendations
- 6. IANA Considerations
- 6.1 OAuth Access Token Type Registration
- 6.2 OAuth Extensions Error Registration
- 7. References
- 7.1 Normative References
- 7.2 Informative References
Appendices
Related Resources
- Official Text: RFC 6750 (TXT)
- Official Page: RFC 6750 DataTracker
- Related Document: RFC 6749 - OAuth 2.0 Authorization Framework
- Errata: RFC Editor Errata
Quick Reference
What is a Bearer Token?
A bearer token is a security token with the property that any party in possession of the token (a "bearer") can use it to get access to the associated resources. Unlike other types of tokens, using a bearer token does not require the bearer to prove possession of cryptographic key material.
Three Methods of Using Bearer Tokens
- Authorization Request Header (Recommended) -
Authorization: Bearer <token> - Form-Encoded Body Parameter -
access_tokenparameter in POST request body - URI Query Parameter (Not Recommended) -
?access_token=<token>in URL
Why Protection is Required?
Since anyone with a bearer token can use it, you MUST:
- ✅ Use HTTPS for transmission
- ✅ Set reasonable expiration times
- ✅ Avoid passing tokens in URLs (they get logged)
- ✅ Store tokens securely
Important: This RFC is a companion document to RFC 6749 (OAuth 2.0), defining how to use access tokens issued by OAuth 2.0.