mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-02-21 21:43:43 +01:00
Apply text suggestions
Signed-off-by: Kévin Commaille <zecakeh@tedomum.fr>
This commit is contained in:
parent
0c50195a32
commit
e8c2f9a2a2
|
|
@ -1483,12 +1483,11 @@ MAY reject weak passwords with an error code `M_WEAK_PASSWORD`.
|
||||||
|
|
||||||
#### Grant types
|
#### Grant types
|
||||||
|
|
||||||
OAuth 2.0 defines several ways in [RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749)
|
[RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749) and other RFCs define
|
||||||
and other RFCs to obtain an access token at the token endpoint, these are called
|
several "grant types": ways to obtain an ["access token"](#using-access-tokens).
|
||||||
grants.
|
|
||||||
|
|
||||||
All these grants require the client to know the following authorization server
|
All these grants types require the client to know the following authorization
|
||||||
metadata:
|
server metadata:
|
||||||
- `token_endpoint`
|
- `token_endpoint`
|
||||||
- `grant_types_supported`
|
- `grant_types_supported`
|
||||||
|
|
||||||
|
|
@ -1498,11 +1497,6 @@ This specification supports the following grant types:
|
||||||
- [Authorization code grant](#authorization-code-grant)
|
- [Authorization code grant](#authorization-code-grant)
|
||||||
- [Refresh token grant](#refresh-token-grant)
|
- [Refresh token grant](#refresh-token-grant)
|
||||||
|
|
||||||
{{% boxes/note %}}
|
|
||||||
Other MSCs might add support for more grant types in the future, like [MSC4108](https://github.com/matrix-org/matrix-spec-proposals/pull/4108)
|
|
||||||
which makes use of the device code grant.
|
|
||||||
{{% /boxes/note %}}
|
|
||||||
|
|
||||||
##### Authorization code grant
|
##### Authorization code grant
|
||||||
|
|
||||||
As per [RFC 6749 section 4.1](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1),
|
As per [RFC 6749 section 4.1](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1),
|
||||||
|
|
@ -1516,13 +1510,14 @@ metadata:
|
||||||
- `response_mode_supported`
|
- `response_mode_supported`
|
||||||
|
|
||||||
To use this grant, homeservers and clients MUST:
|
To use this grant, homeservers and clients MUST:
|
||||||
- support the authorization code grant as per [RFC 6749 section 4.1](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1)
|
|
||||||
- support the [refresh token grant](#refresh-token-grant)
|
- Support the authorization code grant as per [RFC 6749 section 4.1](https://datatracker.ietf.org/doc/html/rfc6749#section-4.1).
|
||||||
- support PKCE using the `S256` code challenge method as per [RFC 7636](https://datatracker.ietf.org/doc/html/rfc7636)
|
- Support the [refresh token grant](#refresh-token-grant).
|
||||||
- use pre-registered, strict redirect URIs
|
- Support PKCE using the `S256` code challenge method as per [RFC 7636](https://datatracker.ietf.org/doc/html/rfc7636).
|
||||||
- use the `fragment` response mode as per [OAuth 2.0 Multiple Response Type
|
- Use pre-registered, strict redirect URIs.
|
||||||
|
- Use the `fragment` response mode as per [OAuth 2.0 Multiple Response Type
|
||||||
Encoding Practices](https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html)
|
Encoding Practices](https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html)
|
||||||
for clients with an HTTPS redirect URI
|
for clients with an HTTPS redirect URI.
|
||||||
|
|
||||||
###### Login flow with the authorization code grant
|
###### Login flow with the authorization code grant
|
||||||
|
|
||||||
|
|
@ -1532,37 +1527,44 @@ read/write access and allocating a device ID.
|
||||||
|
|
||||||
First, the client needs to generate the following values:
|
First, the client needs to generate the following values:
|
||||||
|
|
||||||
- a random value for the `device_id`
|
- `device_id`: a unique identifier for this device; see the
|
||||||
- a random value for the `state`
|
[`urn:matrix:client:device:<device_id>`] scope.
|
||||||
- a cryptographically random value for the `code_verifier`
|
- `state`: a unique opaque identifier, like a [transaction ID](#transaction-identifiers),
|
||||||
|
that will allow the client to maintain state between the authorization request
|
||||||
|
and the callback.
|
||||||
|
- `code_verifier`: a cryptographically random value that will allow to make sure
|
||||||
|
that the client that makes the token request for a given `code` is the same
|
||||||
|
one that made the authorization request.
|
||||||
|
|
||||||
|
It is defined in [RFC 7636](https://datatracker.ietf.org/doc/html/rfc7636) as
|
||||||
|
a high-entropy cryptographic random string using the characters `[A-Z]`,
|
||||||
|
`[a-z]`, `[0-9]`, `-`, `.`, `_` and `~` with a minimum length of 43 characters
|
||||||
|
and a maximum length of 128 characters.
|
||||||
|
|
||||||
**Authorization request**
|
**Authorization request**
|
||||||
|
|
||||||
It then constructs the authorization request URL using the
|
The client then constructs the authorization request URL using the
|
||||||
`authorization_endpoint` value, with the following query parameters:
|
`authorization_endpoint` value, with the following query parameters:
|
||||||
|
|
||||||
- The `response_type` value set to `code`
|
| Parameter | Value |
|
||||||
- The `client_id` value obtained by registering the client metadata with the
|
|-------------------------|----------------------------------------------------|
|
||||||
server
|
| `response_type` | `code` |
|
||||||
- The `redirect_uri` value that MUST match one of the values registered in the
|
| `client_id` | The client ID returned from client registration. |
|
||||||
client metadata
|
| `redirect_uri` | The redirect URI that MUST match one of the values registered in the client metadata |
|
||||||
- The `scope` value set to `urn:matrix:client:api:* urn:matrix:client:device:<device_id>` with the `device_id` generated previously
|
| `scope` | `urn:matrix:client:api:* urn:matrix:client:device:<device_id>` with the `device_id` generated previously. |
|
||||||
- The `state` value
|
| `state` | The `state` value generated previously. |
|
||||||
- The `response_mode` value
|
| `response_mode` | `fragment` or `query` (see "[Callback](#callback)" below). |
|
||||||
- The `code_challenge` computed from the `code_verifier` value using the SHA-256
|
| `code_challenge` | Computed from the `code_verifier` value generated previously using the SHA-256 algorithm, as described in [RFC 7636](https://datatracker.ietf.org/doc/html/rfc7636) |
|
||||||
algorithm, as described in [RFC 7636](https://datatracker.ietf.org/doc/html/rfc7636)
|
| `code_challenge_method` | `S256` |
|
||||||
- The `code_challenge_method` set to `S256`
|
|
||||||
|
|
||||||
This authorization request URL must be opened in the user's browser:
|
This authorization request URL must be opened in the user's browser:
|
||||||
|
|
||||||
- For web-based clients, this can be done through a redirection or by opening
|
- For web-based clients, this can be done through a redirection or by opening
|
||||||
the URL in a new tab
|
the URL in a new tab.
|
||||||
- For native clients, this can be done by opening the URL:
|
- For native clients, this can be done by opening the URL using the system
|
||||||
- using the system browser
|
browser, or, when available, through platform-specific APIs such as
|
||||||
- through platform-specific APIs when available, such as
|
[`ASWebAuthenticationSession`](https://developer.apple.com/documentation/authenticationservices/aswebauthenticationsession)
|
||||||
[`ASWebAuthenticationSession`](https://developer.apple.com/documentation/authenticationservices/aswebauthenticationsession)
|
on iOS or [Android Custom Tabs](https://developer.chrome.com/docs/android/custom-tabs).
|
||||||
on iOS or [Android Custom Tabs](https://developer.chrome.com/docs/android/custom-tabs)
|
|
||||||
on Android
|
|
||||||
|
|
||||||
Sample authorization request, with extra whitespaces for readability:
|
Sample authorization request, with extra whitespaces for readability:
|
||||||
|
|
||||||
|
|
@ -1578,23 +1580,23 @@ https://account.example.com/oauth2/auth?
|
||||||
code_challenge_method = S256
|
code_challenge_method = S256
|
||||||
```
|
```
|
||||||
|
|
||||||
**Callback**
|
<a id="callback"></a> **Callback**
|
||||||
|
|
||||||
Once completed, the user is redirected to the `redirect_uri`, with either a
|
Once completed, the user is redirected to the `redirect_uri`, with either a
|
||||||
successful or failed authorization in the URL fragment or query parameters.
|
successful or failed authorization in the URL fragment or query parameters.
|
||||||
Whether the parameters are in the URL fragment or query parameters is determined
|
Whether the parameters are in the URL fragment or query parameters is determined
|
||||||
by the `response_mode` value:
|
by the `response_mode` value:
|
||||||
|
|
||||||
- if set to `fragment`, the parameters will be placed in the URL fragment, like
|
- If set to `fragment`, the parameters will be placed in the URL fragment, like
|
||||||
`https://example.com/callback#param1=value1¶m2=value2`
|
`https://example.com/callback#param1=value1¶m2=value2`.
|
||||||
- if set to `query`, the parameters will be in placed the query string, like
|
- If set to `query`, the parameters will be in placed the query string, like
|
||||||
`com.example.app:/callback?param1=value1¶m2=value2`
|
`com.example.app:/callback?param1=value1¶m2=value2`.
|
||||||
|
|
||||||
To avoid disclosing the parameters to the web server hosting the `redirect_uri`,
|
To avoid disclosing the parameters to the web server hosting the `redirect_uri`,
|
||||||
clients should use the `fragment` response mode if the `redirect_uri` is an
|
clients SHOULD use the `fragment` response mode if the `redirect_uri` is an
|
||||||
HTTPS URI with a remote host.
|
HTTPS URI with a remote host.
|
||||||
|
|
||||||
In both success and failure cases, the parameters will have the `state` value
|
In both success and failure cases, the parameters will include the `state` value
|
||||||
used in the authorization request.
|
used in the authorization request.
|
||||||
|
|
||||||
A successful authorization will have a `code` value, for example:
|
A successful authorization will have a `code` value, for example:
|
||||||
|
|
@ -1623,11 +1625,13 @@ the token endpoint.
|
||||||
This is done by making a POST request to the `token_endpoint` with the following
|
This is done by making a POST request to the `token_endpoint` with the following
|
||||||
parameters, encoded as `application/x-www-form-urlencoded` in the body:
|
parameters, encoded as `application/x-www-form-urlencoded` in the body:
|
||||||
|
|
||||||
- The `grant_type` set to `authorization_code`
|
| Parameter | Value |
|
||||||
- The `code` obtained from the callback
|
|-----------------|------------------------------------------------------------|
|
||||||
- The `redirect_uri` used in the authorization request
|
| `grant_type` | `authorization_code` |
|
||||||
- The `client_id` value
|
| `code` | The value of `code` obtained from the callback. |
|
||||||
- The `code_verifier` value generated at the start of the authorization flow
|
| `redirect_uri` | The same `redirect_uri` used in the authorization request. |
|
||||||
|
| `client_id` | The client ID returned from client registration. |
|
||||||
|
| `code_verifier` | The value generated at the start of the authorization flow. |
|
||||||
|
|
||||||
The server replies with a JSON object containing the access token, the token
|
The server replies with a JSON object containing the access token, the token
|
||||||
type, the expiration time, and the refresh token.
|
type, the expiration time, and the refresh token.
|
||||||
|
|
@ -1687,13 +1691,12 @@ token to the client in addition to the access token.
|
||||||
The access token MUST be short-lived and SHOULD be refreshed using the
|
The access token MUST be short-lived and SHOULD be refreshed using the
|
||||||
`refresh_token` when expired.
|
`refresh_token` when expired.
|
||||||
|
|
||||||
The homeserver SHOULD issue a new refresh token each time one is used, and
|
The homeserver SHOULD issue a new refresh token each time an old one is used,
|
||||||
invalidate the old one. It should do this only if it can guarantee that in case
|
and invalidate the old one. However, it MUST ensure that the client is able to
|
||||||
a response with a new refresh token is not received and stored by the client,
|
retry the refresh request in the case that the response to the request is lost.
|
||||||
retrying the request with the old refresh token will succeed.
|
|
||||||
|
|
||||||
The homeserver SHOULD consider that the session is compromised if an old,
|
The homeserver SHOULD consider that the session is compromised if an old,
|
||||||
invalidated refresh token is being used, and SHOULD revoke the session.
|
invalidated refresh token is used, and SHOULD revoke the session.
|
||||||
|
|
||||||
The client MUST handle access token refresh failures as follows:
|
The client MUST handle access token refresh failures as follows:
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue