Client Credentials Grant Flow is REALLY BAD

Поделиться
HTML-код
  • Опубликовано: 4 фев 2025

Комментарии • 9

  • @MortenHolje
    @MortenHolje Год назад +1

    Hi Michael, thanks for great videos about grant flows. I think you should have specified that the auth service grants tokens which you use to consume resources from an API. It's alot better than using API keys. Still learning, so please correct me if im wrong here (anyone, not just Michael).

  • @ygorcosta6893
    @ygorcosta6893 Год назад

    It depends a lot on the system's requirements. For instance, if you need to make this query on the front end, you leave the client ID and secret on the backend. After receiving the token, you can then use it securely on the front end. However, it's essential to restrict the token's lifespan; otherwise, it won't be effective.

  • @benpracht2655
    @benpracht2655 Год назад +1

    What should be done instead? How would you handle an automated request from another backend service?

    • @Renanfg
      @Renanfg 11 месяцев назад +1

      so this flow is good for backend to backend since there's no exposure

  • @kaustubh1871
    @kaustubh1871 Год назад

    Hi, Great Explanation. I was really clear and was on point! It would be great if you could make a similar one for implicit grant and resource owner credentials grant. Thank you.

  • @ScrotoTBaggins
    @ScrotoTBaggins Год назад +2

    I little simplistic to just say client credentials bad

    • @bissellator
      @bissellator  Год назад

      They're simply unsecure.

    • @longb1913
      @longb1913 Год назад

      what to use instead then@@bissellator

    • @rhysevancampbell
      @rhysevancampbell 4 месяца назад +1

      @@bissellator I kind of agree with the comment. Bad for what? What is the better approach? And in what situation?