Skip to content

Safety of OAuth client secret in .gitconfig #1315

Answered by hickford
eboskma asked this question in Q&A
Discussion options

You must be logged in to vote

It's harmless but confusing. There are two kinds of OAuth client, public clients and confidential clients. It's expected the "secrets" of public clients such as native apps are non-confidential https://datatracker.ietf.org/doc/html/rfc8252#section-8.5

Secrets that are statically included as part of an app distributed to multiple users should not be treated as confidential secrets, as one user may inspect their copy and learn the shared secret.

For this reason, enlightened servers allow public clients to authenticate with just client id, omitting the secret:

it is NOT RECOMMENDED for authorization servers to require client authentication of public native apps clients using a shared secr…

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@eboskma
Comment options

Answer selected by eboskma
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants