Skip to content

Conversation

@mcguinness
Copy link
Collaborator

Make clear that public clients need to fallback to existing authorization code flow to Resource App to obtain user consent interactively

Make clear that public clients need to fallback to existing authorization code flow to Resource App to obtain user consent interactively
@sdesen
Copy link

sdesen commented Oct 1, 2025

Does this mean public clients should obtain user consent via authz_code, and then subsequently pickup this flow and make a call to the IdP? Wouldn't the authz_code flow already provide a token?

@mcguinness
Copy link
Collaborator Author

mcguinness commented Oct 1, 2025

This was response to mailing list feedback

8.1 Client Authentication
This specification SHOULD only be supported for confidential clients. Public clients SHOULD redirect the user with an OAuth 2.0 Authorization Request.

Which AS are the public clients redirecting the user? How would this work? If this works, then why are needing this specification?

My attempt with the PR was to help reader understand that public client can't currently use token exchange to obtain an ID-JAG and must fall back to what they do today and redirect user to the Resource App AS to get an authorization code.

Related is #36

@mcguinness mcguinness requested a review from aaronpk October 10, 2025 04:03
@aaronpk aaronpk merged commit 2aedd72 into oauth-wg:main Oct 18, 2025
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants