Torsten,

> Another question: how does the server validate the
> identity/authenticity of the client? In other words, what
> does a malicious app prevent from using the URL and server
> of another native app?

Let me rephrase your question (correct me if I'm wrong): can
a malicious native app obtain an authcode that the user has
granted to a legitimate native app, by using the ancillary
server of the legitimate app?  The answer is yes, but only
if the user installs the malcious app on his/her own
machine, in which case there can be no security.  The
authcode is downloaded to the browser that was used for user
authentication, and it is delivered by the browser to an
application running on the same machine.

(From an earlier message...)
> These also means the availabilty of the native app on a
> device depends on the availabilty of this backend service. I
> don't know whether the average store website has a
> reasonable availability.

Availability is not a problem these days.  We use virtual servers 
on the Amazon cloud, which are very cheap, and availability is 
practically 100%.

Regards,

Francisco

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to