c# - OAuth client credentials (key + secret) needed in a desktop app even with valid token credentials -


i under impression once authorization process done, access token , secret (token credentials) needed use target resource. according quote [in cases, client credentials cannot trusted , can used informational purposes only, such in desktop application clients] may not case. running problem after authorization consumer key , secret (client credentials) still needed in order access resource. not seem right.

i have implemented oauth in desktop application looking dotnetopenauth samples. have used unchanged inmemorytokenmanager , desktopconsumer , works once authorized. when restart app , reuse saved token credentials, app fails access resource. if used saved token credentials + client credentials, resource accessed alright. design? sounds incorrect no expert.

this correct. per oauth 1.0 spec, client credentials required every time use access token. protects leaked access token being exploited client. reasoning assumes client secret in fact secret, point out cannot assumed desktop app. nevertheless, can have "secret" isn't secret, , maintain across launches of app, keep ticking along.


Comments

Popular posts from this blog

php - What is the difference between $_SERVER['PATH_INFO'] and $_SERVER['ORIG_PATH_INFO']? -

fortran - Function return type mismatch -

queue - mq_receive: message too long -