You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This specific carve-out for the nonce protection is really an edge case, which could probably be made even more explicit. It is not meant to be the common case, which is why the narrative text describes the use of code_challenge. I could borrow some more language from the security BCP that talks about the specific conditions in which it's okay to use the nonce from here if that would make it more clear: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics#section-4.5.3.2
In that case, my take would be to be very explicit in Section 7.5.2 about this being an edge case. And maybe add some sentence saying ASs are still recommended to require code_challenge and code_verifier even if these conditions are met.
The following text snippets seem like a
code_challenge
is always required in the authorization request (for authZ code flows).Description of the authZ code flow figure:
oauth-v2-1/draft-ietf-oauth-v2-1.md
Lines 1468 to 1470 in f79f588
oauth-v2-1/draft-ietf-oauth-v2-1.md
Lines 1485 to 1487 in f79f588
oauth-v2-1/draft-ietf-oauth-v2-1.md
Lines 1493 to 1494 in f79f588
Section 4.3.1:
oauth-v2-1/draft-ietf-oauth-v2-1.md
Lines 1863 to 1865 in f79f588
Whereas various other places, most prominently Section 7.5.2, state that
code_challenge
is (only) required unless some conditions are met:oauth-v2-1/draft-ietf-oauth-v2-1.md
Lines 2743 to 2750 in f79f588
The text was updated successfully, but these errors were encountered: