Skip to content

Commit e0f1fdd

Browse files
committed
docs: add pointer to mandatory PKCE in OAuth 2.1
1 parent 5c6e318 commit e0f1fdd

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

backend/docs/ARCHITECTURE.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,4 +165,7 @@ pub async fn inventory_handler(
165165
....
166166
```
167167

168-
The OIDC IdToken, AccessToken, mapped roles are stored encryped and tamperproof in a private cookie in the user's browser. This is important, because otherwise the user may give themselves different roles that they are not authorised for.
168+
The OIDC IdToken, AccessToken, mapped roles are stored encryped and tamperproof in a private cookie in the user's browser. This is important, because otherwise the user may give themselves different roles that they are not authorised for.
169+
170+
Important: We added PCKE verification to the Authorization Code Flow, because this is [mandatory as of OAuth 2.1](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12):
171+
> The authorization code grant is extended with the functionality from PKCE [RFC7636](https://www.rfc-editor.org/info/rfc7636) such that the default method of using the authorization code grant according to this specification requires the addition of the PKCE parameters

0 commit comments

Comments
 (0)