How shall the authorization server ensure that the calling client is a 
user-agent based app (i.e. a native app could impersonate an user-agent based 
app)?

In my opinion, enforcing explicit user consent is the only way to prevent this 
kind of attack.

regards,
Torsten.

> -----Ursprüngliche Nachricht-----
> Von: Marius Scurtescu [mailto:mscurte...@google.com]
> Gesendet: Mittwoch, 11. Mai 2011 20:28
> An: Lodderstedt, Torsten
> Cc: oauth@ietf.org; Doug Tangren
> Betreff: Re: [OAUTH-WG] oauth2 implicit flow user experience
> 
> On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten
> <t.lodderst...@telekom.de> wrote:
> > Hi Marius,
> >
> > wrt "auto-approval": how is the authorization server supposed to
> validated the client's identity in a reliable way? Otherwise another
> application (using the id of the legitimate client) could abuse the
> authorization previously approved by the user as long as the session
> with the authorization server is valid. The redirect_uri won't help for
> all kinds of clients since a native app could use the correct
> redirect_uri and nevertheless get access to the token.
> 
> The only validation is based on the redirect URI. Native apps should
> not use the implicit flow, and in general there is no need for
> auto-approval for them.
> 
> Marius
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to