OAuth client credentials flow

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024

Комментарии • 15

  • @jgoebel
    @jgoebel  3 года назад +11

    What do you think about this explanation?
    Was ist clear?

    • @cherryqyang
      @cherryqyang 3 года назад

      Can you please add the explanation of all the claims of the access token from client id/secret such as scopes, issuer, sub etc, how are the attributes being used. Do they need to match what is specified on resources servers ? Or they are just some random string identifier? That would be helpful...

    • @TheChrisisthebest
      @TheChrisisthebest 3 года назад

      The most straight to the point I have found! Thanks

    • @joshipiano
      @joshipiano 2 года назад

      Actually not very clear.. I think your PKCE video was way better... I mean how is the usecase1 different from normal auth code flow ?

    • @jgoebel
      @jgoebel  2 года назад +2

      @@joshipiano authorization code flow always involves a natural person (therefore also called 3-legged OAuth) whereas client credentials flow is if the application is accessing the data on behalf of itself (like a service account for machine to machine communication). With client credentials flow you get the token directly from the token endpoint. There is no orchestration between the authorization server and the user.

    • @jorish9155
      @jorish9155 Год назад

      I really don't understand. What is the difference between clientid/clientsecret and a username/password? Why can't a mobile app keep a secret? A mobile app can keep a password, right?
      Does this flow make sense if the authorization server and ressource server are the same application? Like in internal business apps?

  • @deepnoida
    @deepnoida 2 года назад +2

    "client secret for confidential servers only" Thank you.

  • @andreas956
    @andreas956 2 года назад +1

    Great short and concise video. Can you make a similar one but this time a deep dive about Client Credential Grant flow using a SSL certificate and making use of Client Assertions. (Instead of client secret)
    The benefits with using that.

  • @bbstriker
    @bbstriker 3 года назад +1

    Thank you for a great explanation and same for all your other great tutorials. I would like to ask for the 2 legged OAUTH example. Can the Authorisation server be in the client's realm/ domain? If so, then the resource server (I.e. Google Compute Engine in the example) would need to trust the Authorisation server and validate the Token? Also, we would configure PKCE in any case? Thank you. Tony

    • @jgoebel
      @jgoebel  3 года назад +2

      PKCE is only used for the authorization code grant because with the client credentials flow you directly get the token from the authorization server. The authorization server is typically in the same realm like the resource server or the resource server could also be run by some identity provider. Running the authorization server in the client's realm would only make sense if you are building a first party app

  • @wardevoidnoodle
    @wardevoidnoodle 2 года назад

    Thanks I was wondering if I should care about a refresh token or not

    • @jgoebel
      @jgoebel  2 года назад +2

      you do not need a refresh token with the client credentials flow because you are getting the token directly from the authorization server. The client credentials flow is designed for machine-to-machine communication. Refresh token only make sense if the user is involved, i.e. if you have a user sitting in front of an application and granting you limited access to an HTTP resource

  • @jaleelcaines4526
    @jaleelcaines4526 2 года назад

    anda perlu melaraskan kandungan

  • @i0.0t
    @i0.0t 2 года назад

    Posting context dependent video tutorials to youtube in small clips isn't the most helpful thing in the world