-
Notifications
You must be signed in to change notification settings - Fork 327
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Command line login using Authorization Code Flow #422
Comments
@sp-manuel-jurado that's an interesting use case Seems feasible to integrate a light client into a cmdline program which just handed off login to VP... I see you've found #362. I think that's a better solution overall but lets run with this for just a second.. If you send the user to You would get a VP issued JWT in the form of a cookie from If you hand that cookie to We could improve @aaronpk what do you think of this setup? Does this fit your original intention with that blog post? But let me say again I think the real solution is #362. I'll respond to your note there in just a moment. |
closing in favor of #362 |
Hi, @bnfinet excuse me for the delay, I've been out for a few weeks.
IMHO both features should coexist:
So It would be very useful for us (In fact It would be nice to have more info like the state to refresh token in case it is necessary) @bnfinet What do you think about this? (maybe I'm missing something) |
@sp-manuel-jurado yeah that all sounds good. Non-browser Authorization Code Flow seems like a fine addition to VP. Is this something you're interested in working on? |
Hi,
Would It be possible to log against the vouch proxy from the command line, making a script like https://developer.okta.com/blog/2018/07/16/oauth-2-command-line and being able to obtain
access_token(jwt)
(using response headers likeX-Vouch-IdP-IdToken
,X-Vouch-IdP-AccessToken
)?I see that
/validate
can also validate byaccess_token
(as querystring) orAuthentication Bearer
(header):It would be very useful for me to be able to make secure API requests from the console to the server bypassing the
access_token(jwt)
(instead of the browser cookie).Thanks in advance.
The text was updated successfully, but these errors were encountered: