-
-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
An option to require PKCE parameters #179
Comments
I have to read it up again, but I think to remember the standard does not define whether this is to be enforced, which is why it's optional in the first place and considered an implementation detail. However, I will check again and come back to you. |
Note that there's a relevant attack described in OAuth 2.0 Security Best Current Practice:
|
@saschanaz I'm definitely with you on this topic, however I need to review the tests and code to see, what is already implemented. It mostly breaks down to this:
Would you support us with a review if we provide a PR? Can you test against a real-world setup? |
I can review to see if it fits what the spec says, but I don't have a real-world setup now since I still haven't figured out how to implement #180. |
FYI and FWIW; While I'm actively working on a solution to force PKCE for all clients I wanted to underline, there is a current way to enforce PKCE for all clients via model implementation in The last two parameters of |
self note: add this to the docs then we can close this issue |
It seems it's fully optional right now:
node-oauth2-server/lib/grant-types/authorization-code-grant-type.js
Lines 122 to 144 in c993eb5
Could be great if there's an option to force it. Of course one can block the request manually by checking the query, though.
The text was updated successfully, but these errors were encountered: