Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OAuth 2.0 Client Credentials Basic Auth #2106

Closed
1 task done
francesconi opened this issue Apr 17, 2024 · 3 comments
Closed
1 task done

OAuth 2.0 Client Credentials Basic Auth #2106

francesconi opened this issue Apr 17, 2024 · 3 comments

Comments

@francesconi
Copy link

I have checked the following:

  • I've searched existing issues and found nothing related to my issue.

Describe the feature you want to add

There are multiple ways of authenticating OAuth 2.0 Clients at the /oauth2/token:

RFC 6749 section 2.3.1

  • HTTP Basic Authorization (client_secret_basic) - the OAuth 2.0 Client ID and secret are sent in the HTTP Header (Authorization: basic ....)
  • HTTP Body (client_secret_post) - the OAuth 2.0 Client ID and secret are sent in the POST body (Content-Type: application/x-www-form-urlencoded)

Currently, bruno only supports the client_secret_post method for client authentication. This feature request proposes adding support for client_secret_basic as configuration option.

Mockups or Images of the feature

image

@francesconi francesconi added the enhancement New feature or request label Apr 17, 2024
@reneeshr
Copy link

Indeed this is a must-have feature to fully migrate the Oauth 2.0-supported API testing to Bruno

@andifalk
Copy link

Please release this feature as soon as possible. I am currently stuck with my IAM which only supports client credentials as basic auth and denies exchanging authz code into a token.

@anusree-bruno
Copy link
Collaborator

This is available now

Image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants