-
Notifications
You must be signed in to change notification settings - Fork 694
Support for Authorization code with PKCE #470
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Currently, it's just an early proposal and the foundation for a disussion. The good message is: This lib follows best practices to use it in a safe way and when you combine it with OIDC you get further protections. So the current strategy is to wait for the final version of this doucment and than decide what's next. |
It would be nice to see this be implemented sooner rather than later. This isn't a standard we're waiting on, its a BCP. The actual standards for Authorization Code Flow[1] and PKCE[2] are already well established, proposed standards. The BCP is more relevant for determining the default grant types used by libraries, such as this. [1] https://tools.ietf.org/html/rfc6749, https://tools.ietf.org/html/rfc8252 |
@seglberg I did an Authorization Code Flow implementation without PKCE, but unfortunately the PR was rejected. You can have a look at https://github.com/bechhansen/angular-oauth2-oidc |
Yes! I'm aware of that. 👍 |
https://brockallen.com/2019/01/03/the-state-of-the-implicit-flow-in-oauth2/ I just wanted to add this here. I consider Brock and Dominick opinion important on this topic. |
The first one is a draft; the second one experimental. Nethertheless, I'll begin to implement it soon. @bechhansen should we merge our efforts? Back then, I decided against it b/c I wanted to keep this lib as small as possible but things are changing now with those proposals. |
@manfredsteyer sure. It ought to be fairly easy to merge my stuff to the upstream. |
@bechhansen I've noticed that you are implementing the refresh tokens as part of the During my time working with I'd imagine that the majority of users (hopefully everyone) would be using I'm not sure this library should include the handling of refresh tokens as this might encourage users to implement bad practice. What are your thoughts on this? |
Any updates? |
According the newest spec of OAuth2 implicit flow is NOT recommended any more ("Must NOT be used")
https://tools.ietf.org/html/draft-ietf-oauth-security-topics-09#section-2.1.2
https://tools.ietf.org/html/draft-parecki-oauth-browser-based-apps-00#section-7.8
Instead "Authorization code with PKCE" is the recommended one for public clients.
Please also support this Authorization Code Flow with PKCE. Implicit flow is NOT considered as best practice any more.
The text was updated successfully, but these errors were encountered: