The thread model doc was really great, but I still couldn't find anything concrete on what guarantees you lose if you use a public client vs. a confidential one. Honestly, I'm just trying to have the right info to guide users on what auth flow to use and the pros/cons.

On 3/27/2014 7:59 PM, Prateek Mishra wrote:
Bill - as you are referencing CORS in your message, I assume you are
discussing a Javascript-only (browser) client. I believe the implicit flow
was designed for this case and this flow never involves a confidential
client.

Yes, it is a Javascript (browser) client. Implicit flow doesn't allow for a refresh token. Our browser javascript code uses CORS also when participating in the access code grant flow.

Our access codes are digitally signed, and unique. They can only be turned into an access token once. They are associated privately with a redirect URI, state, and client_id. And they have a timeout. We do validation/verification at each part of the flow to make sure the redirectURI, state, and/or client_id is valid. I just want to know what to tell users what security implications there are if they use a public client in this scenario.

Confidential clients may be used with the other flows (code,
resource,..) that are capable of making a TLS call to a Token Endpoint.


BTW, Is there a better list for these types of questions? Didn't have a lot of luck on the Google Group for OAuth.

--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to