Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

While not explicitly mentioned, PKCE is supported! And yes, that draft was an important guide during implementation.


How do you deal with IdP/AS mix-up?

The BCP recommends either sending back client_id and iss (but that draft[1] is long expired, and nobody seems to support that implementation), or asking the client to provider a separate exact-match return URI for each AS. The second solution is what I'm doing when implementing multi-AS/IdP OAuth clients, but this requires the clients to be aware of this vulnerability, and that's a rather tall requirement.

[1] https://tools.ietf.org/html/draft-ietf-oauth-mix-up-mitigati...


There is no issuer in OAuth. Therefore, the distinct-redirect-URI solution is the most universal.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: