-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Missing Resource Owner Password Credentials flow #3
Comments
Yup, correct. I’ll see when I have some time to implement it. I’m curious: Do you intend to use the library in the browser or on the server? |
In the browser, it's a simple React app. I plan to go isomorphic in the Álex Puchades
|
Aren’t you exposing your client credentials (including the secret) then? |
Nope. OAuth2 distinguishes two client types: confidential and public (see here). Public clients are not required to provide its client_secret (as it's the case for an ajax app). I'm using this passport strategy on the server to protect the token endpoint. |
Ah, so you can do the ROPC flow with non-confidential clients as well. I kind of overread that. |
state is not available with ROPC
just to make this library more isomorphic
requestToken will now return an intermediate representation of the http request (can be either a redirect or a post)
@prayerslayer Do you still want this enhancement? If so, can we open it up to "Help Wanted"? |
Yes, do want. It's unlikely I get to this myself though, so I added the help label. |
@prayerslayer Great! |
According to the rfc, the ROPC flow can also be used when there is a high degree of trust between the resource owner and the client, as it's the case with a first-party app, where the use of an implicit flow would hurt UX. OAuth2-client lacks this ROPC flow.
The text was updated successfully, but these errors were encountered: