OAuth 2.0 client authentication
OAuth 2.0 client applications send their authentication credentials using one of the following mechanisms:
Authentication depends on the Client type defined in the AM admin UI under Realms > Realm Name > Applications > OAuth 2.0 > Clients > Client ID > Core:
- Confidential clients
These applications include websites and services that make secure connections to AM.
They can protect their client secret or JSON Web Token (JWT).
You configure the authentication method for a confidential client in the AM admin UI under Realms > Realm Name > Applications > OAuth 2.0 > Clients > Client ID > Advanced as the Token Endpoint Authentication Method.
When a client authenticates with form parameters, the server can store POST data on the user-agent in an
OAUTH_REQUEST_ATTRIBUTEScookie. AM uses the cookie to continue the authentication process across redirects. It marks the cookie for deletion on the next successful OAuth 2.0 authorization.
- Public clients
These are single-page applications and applications running on devices.
They cannot protect secrets.
Public clients identify themselves by client ID, but do not fully authenticate.
Public OpenID Connect clients must specify
noneas their authentication method.