DZone Security Zone

Securing Verifiable Credentials With DPoP: A Spring Boot Implementation


Summary

In my previous article, I demonstrated how to implement OIDC4VCI (credential issuance) and OIDC4VP (credential presentation) using Spring Boot and an Android wallet. This follow-up focuses on a critical security enhancement now mandated by EUDI standards: DPoP (Demonstrating Proof-of-Possession). The Problem With Bearer Tokens Traditional Bearer tokens have an inherent weakness: anyone who obtains the token can use it. If an attacker intercepts or steals a Bearer token, they can impersonate the legitimate client until the token expires (or is revoked).
Read the Original Article

This article originally appeared on DZone Security Zone.

Read Full Article on Original Site

Popular from DZone Security Zone

1
Secrets in Code: Understanding Secret Detection and Its Blind Spots

Jayson DeLancey Dec 13, 2025 17 views

2
BYOLM with Spring AI & MCP: Secure, Swappable AI Everywhere

Soham Sengupta Jan 6, 2026 16 views

3
5 Challenges and Solutions in Mobile App Testing

Zac Amos Jan 2, 2026 13 views

4
Avoid BigQuery SQL Injection in Go With saferbq

Maurits Van Der Schee Dec 31, 2025 13 views

5
Security and Governance Patterns for Your Conversational AI

Rahul Karne Dec 31, 2025 12 views