On 12/19/2011 09:44 AM, Justin Richer wrote:
Native mobile clients can't really be confidential clients.

The distinction between "public" and "confidential" clients is whether or not they can keep deployment-time secrets; which is to say, a client_secret. This is not to say that they can't keep *any* secrets. In particular those generated at runtime, like an access token or refresh token, could be held perfectly safe. But at the time the app is deployed to its running environment, you have to ask "who has access to its code and configuration?"

Ah, thank you. The draft could be a *lot* more explicit about that in its
definitions. After reading it several times, I couldn't figure out who "public"
was to whom.

Native apps also have the concern of embedded browsers vs. external native browsers, and what trust the user puts into them. For all OAuth flows, you have to trust the browser provider on the platform of choice, since the user's going to be logging in directly through that browser. It's very much outside the scope of OAuth to make that world any better though, and there have been long and detailed discussions on this list about that very topic, leading to some concrete recommendations in the draft as it stands today.

As far as I can tell, the recommendations don't work.

Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to