Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarify Auth header requirements #68

Merged
merged 1 commit into from Mar 19, 2022
Merged

Clarify Auth header requirements #68

merged 1 commit into from Mar 19, 2022

Conversation

Blacksmoke16
Copy link
Member

@Blacksmoke16 Blacksmoke16 commented Mar 19, 2022

I did some testing with the 4 dev applications I have, and confirmed that none of them resulted in / or + being included in the resulting base64 string. This is probably due to the limited character set of the client id/secret. If someone's credentials does include those, we should determine if it actually matters if its URL safe or not. As Basic Auth RFC points to the non URL safe Base64 RFC. So I'm skeptical if URL safe was the right thing to suggest in the first place.

I also clarified, and added an example, that padding on the base64 string is required. The example could be used to give a point of reference for someone to validate their implementation against.

Somewhat alievates ccpgames/sso-issues#75, but it should still ultimately 403 if invalid credentials are provided.

The auth header does not need to be URL safe, but does need to include padding
@Blacksmoke16 Blacksmoke16 requested a review from a team March 19, 2022 00:45
@GoldenGnu GoldenGnu merged commit bf79f1d into master Mar 19, 2022
@Blacksmoke16 Blacksmoke16 deleted the clarify-base64 branch March 19, 2022 14:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants