Skip to main content

OAuth Implicit Flow

This article explains what the implicit grant flow type is and how it works. It provides information why the implicit grant flow is not recommended

Warning

Using the implicit grant flow type is not recommended due to its security vulnerabilities. Instead, it is recommended to use the client authentication method set to none and with the use of Proof Key of Code Exchange. To know more about this method, read the client authentication set to none and with the use of PKCE documentation.

What Implicit Flow Is

The implicit grant type was created for public clients, like mobile applications or pure JavaScript front-end applications. It does not include client authentication, but, instead, the client receives access tokens as the result of authorization. The implicit grant type does not support granting refresh tokens.

Implicit Flow Threats

As there is no client authentication present in the implicit grant flow, the process relies on the presence of the resource owner and the registration of the redirection URI. Access tokens are embedded in the redirection URI and can become exposed to the resource owner or other applications that are used on the same device as the client.

Read More

To know more about threats that come with the use of the implicit grant flow, read the following documents:

How Implicit Flow Works

Implicit_Flow.svg
  1. A user tries to access the application (the client).

  2. The client sends an authorization request to the authorize endpoint.

    The client must inform SecureAuth of its desired grant type by using the response_type parameter. For the implicit grant flow type, the value of the response_type parameter must be token.

    See the sample call to the authorize endpoint with SecureAuth as an authorization serve

    curl --location \
    --get \
    --url "https://$TENANT_ID.$REGION_ID.authz.cloudentity.io/$TENANT_ID/$WORKSPACE_ID/oauth2/authorize" \
    --data-urlencode "response_type=token" \
    --data-urlencode "client_id=$CLIENT_ID"
  3. SecureAuth displays a consent screen for the user.

  4. The user gives their consent.

  5. SecureAuth returns the token embedded in the redirection URI.

  6. The client requests protected resources from the resource server and presents the token it received in the previous step.

  7. The resource server validates the token and responds with requested resources.