-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Oauth2: expires_in and refresh_token should be optional #119
Comments
I guess there's no harm in allowing tokens to not expire. That would make two different token responses. Variant 1 - Expires with a certain lifetime and must be refreshed by the client {
"access_token": "Zjk1YjYyNDQtOTgwMy0xMWU0LWIxMDAtMTIzYjkzZjc1Y2Jh",
"token_type": "bearer",
"expires_in": "3600",
"refresh_token": "MTRiMjkzZTYtOTgwNC0xMWU0LWIxMDAtMTIzYjkzZjc1Y2Jh"
} Variant 2 - Never expires (but can still be revoked!) {
"access_token": "Zjk1YjYyNDQtOTgwMy0xMWU0LWIxMDAtMTIzYjkzZjc1Y2Jh",
"token_type": "bearer"
} I guess Variant 1 has the benefit of making it harder to share the keys, so it would probably support a desired behaviour of having specific tokens associated to specific device/app/user combinations. Do you see any benefits in making the |
The benefit is quite egoistic. bimsync does unfortunately not have support for expires_in and refresh_token at the moment. I hope, making them optional, will make it easier for new servers on the market. |
The benefit is to be in line with oauth2 specification as Jon Anders stated. BCF should not specify oauth2 again (and then differently to the official one). A client gets problems, if she relys on BCF's oauth2 specification, but a server on the official one. |
See #124 |
From oauth2 docs (https://tools.ietf.org/html/rfc6749#section-5.1)
expires_in is RECOMMENDED and
refresh_token is OPTIONAL.
I am however not sure if expires_in should be optional or recommended.
The text was updated successfully, but these errors were encountered: