Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Public apps should not use / require a client secret #602

Open
rfleschenberg opened this issue May 28, 2018 · 1 comment
Open

Public apps should not use / require a client secret #602

rfleschenberg opened this issue May 28, 2018 · 1 comment

Comments

@rfleschenberg
Copy link

django-oauth-toolkit generates a client secret even for apps with client type "public". It would be better to not do this, as per https://www.oauth.com/oauth2-servers/client-registration/client-id-secret/

@manhtai
Copy link

manhtai commented Aug 4, 2018

It's generated but you don't need too use it though.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants