Bearer tokens are simple. PKCE is easy to skip. Pushed Authorization Requests feel like overhead. Everything works fine, right up until it doesn't. And when it doesn't, the costs aren't measured in engineering hours. They're measured in regulatory fines, breach notifications, and headlines that make customers look for alternatives.
Most teams evaluate security upgrades by asking what they cost. The better question is what it costs to skip them.
"Good Enough" Security Is a Bet Against the Odds
Standard OAuth 2.0 gives you flexibility. You can use bearer tokens. You can make PKCE optional. You can pass authorization parameters through the browser. You can authenticate clients with shared secrets. None of that is "wrong." It's all spec-compliant.
It's also the configuration that every documented OAuth attack targets.
Bearer tokens operate on a simple principle: whoever holds the token can use it. There's no binding between token and client. If an attacker intercepts a token from a log file, a network capture, or a cross-site scripting vulnerability, they have full access. No questions asked.
Optional PKCE means authorization codes can be intercepted during front-channel redirects and exchanged by the wrong party. Authorization parameters in the browser URL can be tampered with. Client secrets get leaked, committed to repositories, and extracted from mobile apps.
These aren't theoretical attack vectors. They show up in breach reports year after year. The Verizon DBIR consistently ranks stolen credentials among the top patterns. IBM/Ponemon reports the average breach cost at $4.88 million globally, with credential-related breaches taking an average of 292 days to detect and contain.
The longer a breach goes undetected, the more expensive it gets. And bearer token theft is, by nature, silent. There are no failed login attempts to trigger an alert. The token just works for whoever has it.
The Real-World Consequences
When token theft or authorization bypass leads to a breach, the costs arrive from multiple directions at once.
Regulatory fines are not theoretical. GDPR penalties can reach 4% of a company's annual worldwide revenue. HIPAA violations run $100 to $50,000 per compromised record. PCI DSS noncompliance can trigger fines and loss of card processing entirely. These aren't worst-case scenarios. They're the standard enforcement framework. The regulatory surface is wide: a healthcare platform leaking patient session tokens faces HIPAA. A government portal that exposes citizen identity data must comply with FedRAMP and NIST SP 800-63 requirements. A manufacturing control system compromised by stolen API tokens faces scrutiny under IEC 62443 and potential physical safety consequences. The attack, token theft, is the same. The regulatory response varies, but it's always expensive.
Incident response is expensive and slow. Forensic investigation. Legal counsel. Breach notification. Credit monitoring. Public relations. Executive time. IBM/Ponemon data shows organizations without security automation spend $1.76 million more per breach. Custom OAuth implementations with no token binding and minimal logging fall squarely in the "without automation" category.
Customer trust erodes and doesn't come back. Enterprise prospects run security assessments before signing. When your breach history shows access tokens were stolen because they weren't sender-constrained, the conversation shifts from "how much does your product cost?" to "why should we trust you with our data?"
The Asymmetry You Can't Ignore
Here's the core problem with deferring financial-grade security: implementation cost is known and bounded. Breach cost is unknown and potentially existential.
Implementing FAPI 2.0 means adopting a defined set of security mechanisms: Pushed Authorization Requests; mandatory PKCE with S256; sender-constrained tokens via DPoP or mutual TLS; and confidential client authentication using a private-key JWT or certificate-based credentials. These are engineering tasks with a clear scope. And with Duende IdentityServer 8 shipping built-in FAPI 2.0 Security Profile support, including its PAR endpoint, DPoP validation, mTLS token binding, and PKCE enforcement, the implementation path is configuration rather than construction.
A breach has no scope. The direct costs are large. The indirect costs (lost deals, increased insurance premiums, executive distraction) are larger. For companies in regulated industries, a single major breach can be an extinction-level event.
This is not a symmetric risk. You're not weighing equal outcomes. You're weighing a bounded investment against an unbounded liability.
Regulation Is Moving Toward FAPI, Not Away From It
Even if you're not convinced by the risk argument, the regulatory trajectory should get your attention.
PSD2 in Europe mandates strong customer authentication for payment services. Australia's Consumer Data Right requires FAPI compliance. The UK's Open Banking standard is built on FAPI. Brazil's Open Banking ecosystem adopted FAPI as its baseline. The EU's eIDAS 2.0 and digital wallet initiatives are aligning with the same profile.
This is not a niche trend. Healthcare, government services, and insurance are all moving toward similar requirements. The question for most organisations is not whether they'll need financial-grade API security, but when.
Every industry that handles sensitive data via APIs is converging on the same set of security mechanisms that FAPI first formalized. And for any system built on OpenID Connect, the answer is arguably "now", because the attacks these mechanisms prevent are not industry-specific. Bearer token theft, authorization code interception, and client impersonation work the same way whether the target is a bank, a hospital, or a factory floor.
Implementing now means you're ahead of the curve. Implementing after a mandate means scrambling on someone else's timeline with less room for architectural decisions.
The Certification Advantage
There's a practical business benefit to FAPI compliance that goes beyond defence.
FAPI certification from the OpenID Foundation provides documented, third-party proof that your security meets the highest standard. That proof has tangible value in sales cycles, procurement, and audit engagements.
When an enterprise prospect's security team asks how you protect API access, "we follow OAuth best practices" is a conversation. "We're FAPI 2.0 certified" is a checkbox. Duende IdentityServer 8 is conformance-tested against the OpenID Foundation's FAPI 2.0 suite, which means the proof already exists. The difference in procurement velocity is real, as is the reduction in audit scope when you can point to a certified implementation rather than explain a custom one.
The Bottom Line
The cost of implementing financial-grade security is a line item. It's knowable, plannable, and finite. And despite the name, it's not just for financial services. It's the security baseline that every OpenID Connect deployment should aspire to. With IdentityServer 8, it's also significantly smaller than building from scratch, because the hard parts (PAR, DPoP, mTLS, sender-constrained tokens) are already done.
The cost of not implementing it is a probability distribution with a long tail: regulatory penalties, breach response, lost revenue, and reputational damage that compound over the years.
Every quarter you operate with bearer tokens that anyone can use, authorization codes that anyone can intercept, and client authentication built on shared secrets, you're carrying that risk on your balance sheet. Your auditors will find it, your regulators will enforce it, or an attacker will exploit it.
The only question is which one gets there first.
Thanks for stopping by!
We hope this post helped you on your identity and security journey. If you need a hand with implementation, our docs are always open. For everything else, come hang out with the team and other developers on GitHub.
If you want to get early access to new features and products while collaborating with experts in security and identity standards, join us in our Duende Product Insiders program. And if you prefer your tech content in video form, our YouTube channel is the place to be. Don't forget to like and subscribe!
Questions? Comments? Just want to say hi? Leave a comment below and let's start a conversation.