Open hickford opened 1 year ago
Mailing list discussion https://mailarchive.ietf.org/arch/msg/oauth/iJ6WAbJzHWiGmaFO-qAzg30B_28/
Such servers typically assume all clients to be confidential, neglecting security measures appropriate for public clients.
I don't think there is any requirement in the spec that an AS has to support both types of clients, did you see any language to the contrary?
Add an explicit mention in https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#section-2.1 that an AS doesn't have to support public clients.
https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-09.html
Unfortunately many authorization servers don't record client type. Some authorization servers explicitly say that they don't support public clients. Is this okay? Banning public clients tempts app developers to bend the rules and register a public client as a confidential client, compromising security.
SourceHut bans public clients https://man.sr.ht/meta.sr.ht/oauth.md
Azure DevOps bans public clients https://learn.microsoft.com/en-us/azure/devops/integrate/get-started/authentication/azure-devops-oauth?view=azure-devops
GitHub doesn't record client type but seems to deduce it based on redirect URI https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/creating-an-oauth-app