Software / code / prosody-modules
Comparison
mod_http_oauth2/README.markdown @ 5739:426c42c11f89
mod_http_oauth2: Make defaults more secure
This should be fine since we don't have a lot of clients to be
backwards-compatible with.
| author | Kim Alvefur <zash@zash.se> |
|---|---|
| date | Tue, 14 Nov 2023 23:19:19 +0100 |
| parent | 5703:b43c989fb69c |
| child | 5882:761142ee0ff2 |
comparison
equal
deleted
inserted
replaced
| 5738:8488ebde5739 | 5739:426c42c11f89 |
|---|---|
| 222 -- "token"; -- implicit flow disabled by default | 222 -- "token"; -- implicit flow disabled by default |
| 223 } | 223 } |
| 224 ``` | 224 ``` |
| 225 | 225 |
| 226 The [Proof Key for Code Exchange][RFC 7636] mitigation method is | 226 The [Proof Key for Code Exchange][RFC 7636] mitigation method is |
| 227 optional by default but can be made required: | 227 required by default but can be made optional: |
| 228 | 228 |
| 229 ```lua | 229 ```lua |
| 230 oauth2_require_code_challenge = true -- default is false | 230 oauth2_require_code_challenge = false -- default is true |
| 231 ``` | 231 ``` |
| 232 | 232 |
| 233 Further, individual challenge methods can be enabled or disabled: | 233 Further, individual challenge methods can be enabled or disabled: |
| 234 | 234 |
| 235 ```lua | 235 ```lua |
| 236 -- These reflects the default | 236 -- These reflects the default |
| 237 allowed_oauth2_code_challenge_methods = { | 237 allowed_oauth2_code_challenge_methods = { |
| 238 "plain"; -- the insecure one | 238 -- "plain"; -- insecure but backwards-compatible |
| 239 "S256"; | 239 "S256"; |
| 240 } | 240 } |
| 241 ``` | 241 ``` |
| 242 | 242 |
| 243 ### Policy documents | 243 ### Policy documents |