Authorization Code with PKCE
Learn more about Authorization code grant
Prerequisites
- Set up ISVAOP
- Set up an application or relying party that supports authorization code flow
Configuring ISVAOP
The example configuration snippets assume specific keystore names, such as "isvaop_keys". Modify the configuration as needed.
-
Ensure the authorization_code grant type is enabled in provider.yml.
# Copyright contributors to the IBM Security Verify Access OIDC Provider Resources project definition: grant_types: - authorization_code
-
Create a new static client configuration
client_pkce.yml
and copy the following content:# Copyright contributors to the IBM Security Verify Access OIDC Provider Resources project client_id: client_pkce client_secret: "OBF:U2FsdGVkX1989Y/UBwz1BNPbIkv0hgBTcoynJtlRt56hu3TGX+5Kdi4TJ6MLMYtO" # ahwoaor82noawasg is the secret in clear text. client_name: "AuthorizationCode with PKCE" enabled: true redirect_uris: - https://www.google.com grant_types: - authorization_code response_types: - code - code token token_endpoint_auth_method: default require_pkce: true
You can now use your relying party application to execute the authorization code flow.
Updated about 2 years ago