Refresh token — a long-lived token (weeks/months) the client uses to obtain new short-lived access tokens without re-authenticating. Typical flow: access_token lives 15 min, refresh_token 30 days. When access expires, the client POSTs the refresh to the token endpoint → gets a new access. Critical: keep refresh in secure storage (httpOnly cookie, not localStorage).
Below: details, example, related terms, FAQ.
POST /oauth/token
grant_type=refresh_token
refresh_token=XXX
client_id=Y
→ { access_token: "...", refresh_token: "NEW", expires_in: 900 }The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeServer-side: session/database. Client-side: httpOnly + Secure + SameSite=Strict cookie. Never localStorage — XSS risk.
Revoke all refresh tokens for the user via <code>DELETE /tokens WHERE user_id=X</code>. User must relogin.
Best practice. Especially for SPAs. OAuth 2.1 draft mandates rotation.