Skip to content
This repository has been archived by the owner on Feb 14, 2018. It is now read-only.

auth(): separate retrieval of bearer token from verification, so we c… #50

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

bastiaanb
Copy link

…an verify tokens not located in the Authorization header.

…an verify tokens not located in the Authorization header.
@twistedstream
Copy link
Contributor

Hi @bastiaanb. Thanks for the PR.

I'm curious what your use case is for this? Why wouldn't the token be sent to your Nginx server via the Authorization header as a bearer token?

@bastiaanb
Copy link
Author

Hi @twistedstream , the use case here is fitting Auth0 into some existing third party webapps which will not set an Authorization header. So we revert to setting a cookie, even though that means CSRF threats have to be mitigated outside OAuth.
Another case would be for URI encoded tokens in GET requests, for example for protected images.
And maybe even for form encoded tokens.

@jmealo
Copy link

jmealo commented May 13, 2016

@twistedstream third-party health checking tools. Many http health checks don't allow for sending headers.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants