-
Notifications
You must be signed in to change notification settings - Fork 784
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limiting Access to Client Credentials #196
Comments
But endpoints protected by the client credentials grant may be accessible by anyone with access, they are public endpoints, so yes as long as you have a valid token you can access. |
Aren't all end points protected by all grants? Maybe I'm not understanding Right now I have endpoints that use the middleware auth:api. |
The client credentials grant has no user attached, it just gives access to a client for specific endpoints. Think of an endpoint that returns the countries a user can register from, by the time you need this endpoint there's no user object, only a client. |
Okay that makes sense. Our use case here. We have a secure server to server connection that needs to send commands to this api. These commands are not tied to a specific user (as the caller will be sending commands on behalf of all users). |
@huntsfromshadow instead of securing your endpoint with the |
Thanks. |
but it allows password token as well, I just want to provide access to client credential grant based tokens |
Currently a Client Credentials grant works
with password grant client and an authorization grant client.
In either case if the user sends in the correct client_secret and correct client_id to oauth/token the system
authorizes and returns a token.
I'm thinking it may be good to limit clients that can use the client_credential grant similar to how password grant works.
The text was updated successfully, but these errors were encountered: