-
-
Notifications
You must be signed in to change notification settings - Fork 288
invalid_scope - RFC conformance? #52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
lepture
added a commit
to authlib/authlib
that referenced
this issue
Jul 13, 2019
Fixing validate requested scope authlib/example-oauth2-server#52
Fixed in Authlib v0.12 |
Thanks for reporting. |
coopfeathy
added a commit
to coopfeathy/authlib-django
that referenced
this issue
Dec 11, 2022
Fixing validate requested scope authlib/example-oauth2-server#52
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Invalid_scope error is responded when the request contains the scope different than that assigned to the user. Will this cause interoperability problem? RFC-6749, section 3.3 states the following (see bold text):
3.3. Access Token Scope
The authorization and token endpoints allow the client to specify the
scope of the access request using the "scope" request parameter. In
turn, the authorization server uses the "scope" response parameter to
inform the client of the scope of the access token issued.
The value of the scope parameter is expressed as a list of space-
delimited, case-sensitive strings. The strings are defined by the
authorization server. If the value contains multiple space-delimited
strings, their order does not matter, and each string adds an
additional access range to the requested scope.
The authorization server MAY fully or partially ignore the scope
requested by the client, based on the authorization server policy or
the resource owner's instructions. If the issued access token scope
is different from the one requested by the client, the authorization
server MUST include the "scope" response parameter to inform the
client of the actual scope granted.
If the client omits the scope parameter when requesting
authorization, the authorization server MUST either process the
request using a pre-defined default value or fail the request
indicating an invalid scope. The authorization server SHOULD
document its scope requirements and default value (if defined).
The text was updated successfully, but these errors were encountered: