-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to enforce that clients use PKCE #1654
Comments
Nice idea @hickford , thanks! Would you mind to create a PR for it? |
@nbulaj I don't have the expertise with Ruby |
Perhaps it would be more straightforward to have one option to enforce OAuth 2.1 compliance. (In case there are more requirements for OAuth 2.1 in the final version) |
We definitely need to implement the PKCE flow for non-public clients. I'm pleased to see that the PR has been merged. Can we confirm if there are any plans to release a new patch for Doorkeeper? |
Which patch you're talking about @bhuone-garbu ? #1705 was released with 5.7.0. This issue should be closed Or you're talking about the last point of the MR?
|
@nbulaj I just downloaded the latest version 5.7.0 and the config in source code doesn't contain this |
I mean #1705 was only merged a month ago but the latest release |
LOL yeah, changelog entry was added to the wrong place Or not 🤔 |
either way, I can confirm the doorkeeper/lib/doorkeeper/config.rb Lines 116 to 120 in 7ffdeec
|
@nbulaj what's the solution here? 🤔 |
Released as 5.7.1 |
Just checked, that with 5.7.1 See the PKCE RFC:
|
OAuth best practice is to enforce that clients use PKCE. Draft OAuth 2.1 insists authorization servers enforce the use of PKCE by public clients, and recommends enforcing it for all clients https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-08.html#name-countermeasures-2
Thus it would be useful to have an 'enforce client use of PKCE' option with choices: none, public, all.
The text was updated successfully, but these errors were encountered: