Modern security flow/process for trusted Mobile and SPA apps with self-hosted OIDC

Currently, there are two common auth flows i know:

Resource Owner Password Flow
Authentication Code Flow + PKCE (didn’t mention other, since this one is more robust within redirect-based)

This theme was discussed long and across, but for… Continue reading Modern security flow/process for trusted Mobile and SPA apps with self-hosted OIDC

A Native Desktop App using PKCE – Can an id_token be consider valid authentication when passed to another protected server resource?

My understanding is that client impersonation cannot be prevented for Native Desktop Apps. If all standard controls: State, PKCE, Redirect_URI confirmation etc are in place, to prevent auth_code leakage or injection. Then the only way an a… Continue reading A Native Desktop App using PKCE – Can an id_token be consider valid authentication when passed to another protected server resource?