1. Fine-grained token introspection
Current introspection endpoints often return minimal data. Adding standard fields for scopes, client metadata, and token origin would reduce the need for custom extensions, improve audit capabilities, and make debugging straightforward.
2. Native token rotation support
Many providers implement rotation with ad-hoc logic. A standardized mechanism in the OAuth 2.0 spec for automatic, seamless rotation of access and refresh tokens would close a major security gap.
3. Built-in short-lived access token mode
While refresh tokens solve longevity, a mode enforcing ultra-short access token expiry at the protocol level would limit the blast radius of stolen credentials without complicating the client flow.
4. Stronger public client defaults
Public clients—like single-page apps—still lean on implicit flows or complex PKCE mechanics. Updating defaults so PKCE is mandatory, and discouraging flows prone to token leakage, would solidify security without breaking existing deployments.