oauth-v2-1 icon indicating copy to clipboard operation
oauth-v2-1 copied to clipboard

OAuth 2.1 is a consolidation of the core OAuth 2.0 specs

Results 55 oauth-v2-1 issues
Sort by recently updated
recently updated
newest added

Hi, I was looking through the current draft when I found this: ``` The client credentials grant type MUST only be used by confidential clients. ``` I was wondering where...

https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-09.html > Authorization servers MUST record the client type in the client registration details in order to identify and process requests accordingly Unfortunately many authorization servers *don't* record client type....

https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-09#section-3.2.3.1 says that > "**invalid_client**": Client authentication failed (e.g., unknown client, no client authentication included, or unsupported authentication method). The authorization server MAY return an HTTP 401 (Unauthorized) status code...

interim

From the "[Impersonation of native apps](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-07#section-7.3.1)" security considerations section: > Measures such as claimed https scheme redirects MAY be accepted by authorization servers as identity proof. Some operating systems may...

draft-00-feedback
interim

Much of Vittorio's feedback in the native apps section stems from the differences in practice of mobile apps and desktop apps. Should these recommendations be scoped to mobile apps now...

draft-00-feedback

Section 3.2.2 Tokens states that > The client makes a request to the token endpoint by sending the > following parameters using the application/x-www-form-urlencoded > format per Appendix B with...

editorial

The following text snippets seem like a `code_challenge` is always required in the authorization request (for authZ code flows). Description of the authZ code flow figure: https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L1468-L1470 https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L1485-L1487 https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L1493-L1494 Section...

In some places, the term "relying party" is used instead of "client": https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L2820-L2822 https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L2578-L2582

editorial

The URIs for the **redirect** and **authorization** endpoints may contain additional query parameters that must be retained when adding more parameters: https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L860-L865 https://github.com/oauth-wg/oauth-v2-1/blob/f79f58841f717b0e6050da663c4a858bc100fda1/draft-ietf-oauth-v2-1.md?plain=1#L1118-L1121 Furthermore, query parameters must only appear once...

Under [Token Endpoint](https://github.com/oauth-wg/oauth-v2-1/blob/main/draft-ietf-oauth-v2-1.md#token-endpoint), it states: > Authorization servers that wish to support browser-based applications (applications running exclusively in client-side JavaScript without access to a supporting backend server) However, the sentence...