Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove scope from the token refresh request as it is redundant #301

Merged
merged 1 commit into from
Sep 27, 2018

Conversation

WilliamDenniss
Copy link
Member

Scope is a valid parameter for the Refresh Token request (Sectiom 6 of RFC
6749), however it's optional and when ommitted is treated as equal to the scope
originally granted by the resource owner. Since the indented behavior of this
convenience method is to create a token refresh with the full scope, it's
redundant to include.

Related to b5870c0 but slightly different
reason.

Scope is a valid parameter for the Refresh Token request (Sectiom 6 of
RFC 6749), however it's optional and when ommitted is treated as equal
to the scope originally granted by the resource owner. Since the
indented behavior of this convenience method is to create a token
refresh with the full scope, it's redundant to include.

Related to b5870c0 but slightly
different reason.
@codecov-io
Copy link

codecov-io commented Sep 21, 2018

Codecov Report

Merging #301 into pre1.0 will not change coverage.
The diff coverage is 0%.

Impacted file tree graph

@@           Coverage Diff           @@
##           pre1.0     #301   +/-   ##
=======================================
  Coverage   74.02%   74.02%           
=======================================
  Files          58       58           
  Lines        4981     4981           
=======================================
  Hits         3687     3687           
  Misses       1294     1294
Impacted Files Coverage Δ
Source/OIDAuthState.m 46.99% <0%> (ø) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 3858378...e7077f1. Read the comment docs.

@marwenmoalla
Copy link

hello @WilliamDenniss ,
It seems that this modification doesn't align with the Microsoft EntraID specifications in OpenID, particularly the demand for including the scope in the refreshToken when utilizing a custom scope.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants