Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

don't require client secret when using PKCE #337

Merged
merged 1 commit into from
May 31, 2022
Merged

Conversation

C0rby
Copy link
Contributor

@C0rby C0rby commented May 31, 2022

The authorization code flow doesn't require a client secret in case of a public client. Instead, the client needs to use the PKCE extension and send a code challenge / code verifier.
That is why we don't compare the client secret when the client id and code verifier are set in the query parameters.

/cc @dschmidt

@C0rby C0rby requested review from IljaN and DeepDiver1975 May 31, 2022 11:54
@C0rby C0rby self-assigned this May 31, 2022
@sonarcloud
Copy link

sonarcloud bot commented May 31, 2022

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

0.0% 0.0% Coverage
0.0% 0.0% Duplication

Copy link
Member

@IljaN IljaN left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM but would also like a ✔️ from @DeepDiver1975

@DeepDiver1975 DeepDiver1975 merged commit 40b2826 into master May 31, 2022
@delete-merged-branch delete-merged-branch bot deleted the auth-code-flow branch May 31, 2022 13:49
@dschmidt dschmidt mentioned this pull request Jun 1, 2022
42 tasks
@jnweiger jnweiger mentioned this pull request Jun 3, 2022
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants