> On Jul 3, 2019, at 1:44 AM, da...@davidsautter.de wrote:

<snip>

> I understood, that you could also secure this variant of the Authorization 
> Code Flow with PKCE in order to protect the redirect steps. I noticed, that 
> this is rarely discussed "in public" (e.g. blogs, Stackoverflow etc) because 
> some people say PKCE is considered to only be beneficial in native 
> applications. I know it was invented for protecting the IPC steps of those, 
> but why isn't it beneficial to also protect the browser redirect steps?

The PKCE guidance is slowly changing. Previously, PKCE was used mostly for 
native apps as the code could be intercepted in between the front channel and 
back channel calls. This is because operating systems do not restrict 
registration of a custom URI scheme to a single application, so the redirect 
back into the application (with the code) could actually go to another app.

The security-topics draft (and browser apps draft which refers to it) expands 
this to all code flow. The reasoning is that this replaces some of the security 
mitigations pushed onto the state parameter (such as to prevent CSRF) - PKCE is 
both a more obvious place for it, and a client which does not support PKCE 
correctly is detectable by the AS.

-DW
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to