-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a companion server that handles authorization_code flows #1
Comments
Do you see the server being one, single server that manages every one's tokens? Or a separate codebase that developers could stand up on their own? If the latter, what language do you think you will be implementing the server in? |
I definitely want to do both, but I haven't planned exactly the approach I'd be taking. If it's self-hosted, that reduces complexity of writing code but may be less convenient to use. If it's hosted, it'd be more convenient to use but it'll be more work to write, and open-sourcing it would be less useful since there'd be more work to get it set up. I'd love to hear your thoughts though -- what would you find more useful? I'll be writing it in Node.js. |
@edjiang Why don't you make client secret parameter optional? For those who want to take the risk? |
@onmyway133 so, I looked at it a bit more and realized that client_secret actually isn't required as per the OAuth spec for the Authorization Code grant type, so what I'm going to do is:
|
As an update: work on Implicity, the server-side component to Simplicity, has started! I'm going to be at WWDC / Altconf festivities over the next week, so not sure what velocity I'll be getting, but @saimaddali will be joining me to help build out Implicity! |
How is it going? I would love to see Twitter supported by your Lib. |
Unfortunately, I've been working on a lot of other stuff recently, so I don't think this will get done in the near future :( |
+1 |
1 similar comment
+1 |
We can't implement Twitter, GitHub, LinkedIn, Slack, or other login types because we can't do authorization_code grants without a client secret. Client secrets are fundamentally insecure on mobile clients, so we need to create a companion server to help with the authentication request.
The text was updated successfully, but these errors were encountered: