On 2/9/2015 5:03 PM, John Bradley wrote:
OK, I don't know if the WG has discussed the issue of fragments in browser 
history.

So you are trading off several round trips against the possibility of a token 
leaking in browser history or bookmark?


Yes, bookmarking tokens is a little scary, IMO, as we've already run into users bookmarking URLs with codes in them.

Also, wasn't there additional security vulnerabilities surrounding implicit flow? Maybe these were just the product of incorrect implementations, I don't remember, it was a while ago.

One extension that Connect introduced was a "code id_token" response type that 
is fragment encoded.  That would let you pass the code directly to the JS saving two legs.


It looks like OIDC added a "response_mode" parameter where you can specify "query" or "fragment". Thanks for pointing this out!


Thanks for all the help.


--
Bill Burke
JBoss, a division of Red Hat
http://bill.burkecentral.com

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to