Hi John,

On 27/08/13 13:00, John Bradley wrote:
Typically native apps on smart phones use the code flow and a redirect_uri with 
a custom scheme to redirect the browser back to the app with the query encoded 
code.

The native app is a public client as it cannot keep a secret, unless it is 
using dynamic registration.

The ID Nat and I put together is a proposed way that a proof of possession for 
the code can be used as an alternative to registering every instance of a 
native app.

On iOS and android multiple apps can register the same custom scheme and may 
try to intercept the code which can be used if the client_id and secret are 
known.

Thanks for the explanation, helpful; one thing I'd like to clarify, in such cases (where no every instance of the application is dynamically registered), the native application needs to be registered once and have this redirect uri with a custom scheme pre-registered, right ?

I'm assuming it is the case (redirect uri must be pre-registered, no difference here between public and confidential clients as far as the treatment of redirect uris is concerned), but if not then I'd appreciate some clarifications

Cheers, Sergey


John B.

On 2013-08-27, at 6:54 AM, Sergey Beryozkin <sberyoz...@gmail.com> wrote:

Hi

I am a bit confused on whether public clients such as smart phones, etc which 
work with the authorization code flow can have redirect URIs supported or not.

My understanding so far has been that public clients won't have redirect uris 
(except for them working with Implicit code flows), the code would be entered 
into the device by a user or perhaps returned directly from AS via some back 
channel. The reason I ask is the text at [1] says in its Introduction:

"... This is especially true on some smartphone platform in which the 'code' is 
returned to a redirect URI ..."

I can imagine that in this case a smartphone has an application actually 
running a web server so it can accept redirect requests,
is it when public clients can have redirect URIs and texts such as [1] can be 
of help ?

Thanks. Sergey

[1] http://tools.ietf.org/html/draft-sakimura-oauth-tcse-01
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to