OAuth 2.0 is the standard for delegated access. It issues tokens so systems can act on behalf of users without exposing passwords. But tokens are only as trustworthy as their integrity. Immutability means once a token or claim is issued, its data cannot be altered undetected.
In OAuth 2.0, immutability starts with the structure of tokens. JWTs (JSON Web Tokens) carry claims signed with cryptographic keys. The signature locks the payload. Any change breaks the signature, and verification fails. This is what protects client and resource server from tampering.
Immutable claims in OAuth 2.0 include sub (subject), iss (issuer), aud (audience), and exp (expiration). These values define who the token is for, who issued it, when it expires. If any of these change, the token is no longer valid. Short-lived access tokens enforce immutability by limiting attack windows. Longer-lived refresh tokens must be stored in secure, append-only structures to prevent compromise.