Description
This non-normative work product serves as a best effort information for implementers and users of Open Data (OData) alike on where authentication issues, integrity problems and potential attack vectors typically occur. In the case of CSRF (Cross-Site-Request-Forgery) detailed descriptions of general practice dealing with these risks are offered.