Support "client_secret_basic" in token exchange #549
Closed
+80
−17
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Support
client_secret_basic
authentication method during token exchangeMotivation and Context
Some authorization servers (e.g. Auth0, internal OIDC providers) only support
client_secret_basic
authentication,as required by RFC 6749 §2.3.1.
Previously, the SDK always used
client_secret_post
,which caused 401 errors when servers rejected credentials in the request body.
This change adds support for
client_secret_basic
when it is declared intoken_endpoint_auth_methods_supported
in the OAuth metadata.How Has This Been Tested?
client_secret_basic
Breaking Changes
No breaking changes — default behavior remains the same (
client_secret_post
is used unless metadata says otherwise)Types of changes
Checklist
Additional context
This should improve compatibility with OAuth providers that strictly follow the spec.
Let me know if you'd like this logic extracted into a utility function for reuse in
refreshAuthorization
ortoken_exchange
.