Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify that scopes are required in the token request #87

Closed
garethsb opened this issue Dec 8, 2020 · 0 comments · Fixed by #88
Closed

Clarify that scopes are required in the token request #87

garethsb opened this issue Dec 8, 2020 · 0 comments · Fixed by #88

Comments

@garethsb
Copy link
Contributor

garethsb commented Dec 8, 2020

Following Slack discussion yesterday...

RFC 6749 Section 3.3 allows that the "scope" is optional in a token request.

"If the issued access token scope is different from the one requested by the client, the authorization server MUST include the "scope" response parameter to inform the client of the actual scope granted. If the client omits the scope parameter when requesting authorization, the authorization server MUST either process the request using a pre-defined default value or fail the request indicating an invalid scope."

RFC 7591 Section 2 allows a dynamic client registration to include a "scope" parameter.

"String containing a space-separated list of scope values (as described in Section 3.3 of OAuth 2.0 [RFC6749]) that the client can use when requesting access tokens. The semantics of values in this list are service specific. If omitted, an authorization server MAY register a client with a default set of scopes."

Unless there's something more definitive that says that the registered scopes are supposed to become the default for that client, I think we ought to clarify that the token request needs to include (the relevant subset of) them explicitly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant