oauth related discussions #1916
Labels
1) Discussion ongoing
Issue is opened and assigned but no clear proposal yet
Community needed
This issue will not be progressed without community input. Will be closed if stale.
Community wanted
We would like feedback from the community to guide our decision otherwise we will progress
V51
Group issues related to OAuth
_5.0 - prep
This needs to be addressed to prepare 5.0
It's a nice base from Ralph / @csfreak92 , I try now to push those topics forward and validate some ideas.
OAuth - dependency on web architecture
We don't have a link to "OAuth 2.0 for Browser-Based Apps" which should be probably the most relevant document to follow for ASVS.
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-browser-based-apps
From risk point of view, it's completely different, is it BFF solution or browser communicates directly with a authorization server.
Discussion/Proposal 1
The summary for browser based communication says:
Write requirement (preferred) or at least "really strong recommendation" to avoid architecture where the browser communicates directly with authorization server token request and handling access token and refresh token.
Or in OAuth terminology, that OAuth confidential (and not public) client is used.
May be limited to first-party solutions.
edit: moved to separate issue: #1963
Discussion/Proposal 2
For a situation, where OAuth is used as a "first-party" authorization solution and the application needs one and only way how it communicates with the authorization server, then for the OAuth client must be configured and the Authorization Server must validate, that: only the expected values are allowed, that is implemented by the client:
offline_access
may be worth special mentionedit: moved to separate issue: #1964
Discussion/Proposal 3
Probably I was the first one to say that
redirect_uri
validation is a duplicate of general open-redirect but now I think it's important to have them as a separate requirement:redirect_uri
must be validated with the string-match method, which means no "wildcard" validations.There are 2 parts:
edit: moved to separate issue: #1965
Discussion/Proposal 4
There is a clear trend of overengineering using OAuth. One of them is using OAuth only for providing authentication. In this case, directly OIDC should be used without OAuth overhead.
Also addressed here: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-browser-based-apps#section-7.1
edit: moved to separate issue: #1966
The text was updated successfully, but these errors were encountered: