Skip to content

Should enterprise IDPs be required to support public clients #116

@gffletch

Description

@gffletch

The current proposed stable requirements state the following:

Requirements for OpenID Providers

OpenID Providers:

...

  • MUST support public clients as defined in [RFC6749];

If an enterprise is not willing to support public clients (most commonly this is just native applications), what is the enterprise IDP supposed to do from a conformance perspective? Allow them for testing and then turn off the capability? Require all "public" clients to use DCR to move to being a "confidential" client?

How many SaaS RPs are only public clients? Is that really a "good thing" if they are a service and can protect a secret?

If the key goal is to support native applications (most commonly mobin apps) that have to pre-register (currently a requirement) and also register the callback URL (also a current requirement) and make the registered callback URL a "claimed URL" as in an iOS universal link or an Android App Link (not currently a requirement) then I think we should not point to RFC 6749 but rather RFC 8252 OAuth 2.0 for Native Apps. I'm not sure we should support web applications as public clients.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions