Hey @aaronpk, can you explain this help article? It makes no sense to me. TIA
support.okta.com/help/s/arti…
1
Oh yeah, I remember this one. I don't remember if this is still current behavior, but basically Okta is tying to prevent browsers from using anything other than the authorization code PKCE flow. It does that by detecting the Origin header which isn't sent by server apps.
1
1
It's confusing as hell, and I'm confused by the implementation -- on the token endpoint if Origin is present, you require that the authz used PKCE? That's about the only valid approach to that I can imagine.
2
Yeah that's right. I agree it's super confusing and has caused some tricky issues before. It may be different in the new platform but I'd have to double check
1
People are asking, when using standards compliant OIDC client libraries:
github.com/authts/oidc-clien…
1
why does that example have the browser sending a client secret in the request? That seems odd. Happy to continue this over on the github thread.
1
Yep, I confirmed my suspicion. Misleading error message. Will post details on the github thread.
Feb 25, 2022 · 3:03 AM UTC
1

