bulky-holiday-60244
08/19/2022, 9:11 AMred-machine-69654
08/19/2022, 9:38 AMmagnificent-energy-493
Before reading ahead, keep in mind that OAuth2 and OpenID Connect are delegation protocols. OpenID Connect is useful when you want to become a “Sign in with ...” provider like Google or Twitter. If you plan on allowing third party developers access your user’s data with their consent (e.g “Access to your private repositories”), OAuth2 is the correct choice. Using these two protocols in first-party scenario, for example OpenID Connect to attempt and solve “SSO”, can become quite complex due to several conceptual limitations.
If you are looking to solve authentication (login), sign up, profile management, and more check out the Add Authentication to your React Native App article.So we actually recommend using the flows in Ory Kratos, which do not use a browser for mobile. But you can still implement a safe OAuth2 flow on mobile with PKCE, not sure if that is related to what you posted 😅
bulky-holiday-60244
08/19/2022, 11:37 AMmagnificent-energy-493
When you say Kratos is not, where the login form is displayed?In your application 🙂 You can check out our reference application here: https://github.com/ory/kratos-selfservice-ui-react-native https://apps.apple.com/fj/app/ory-profile-app/id1536546333 https://play.google.com/store/apps/details?id=com.ory.kratos_self_service_ui_react_native this blogpost goes into the full details: https://www.ory.sh/login-react-native-authentication-example-api/ You are right PKCE does not really help with the malicious in app browser. .
magnificent-energy-493
Then, if the “bad guy” is motivated... it’s always possible to mimic an in-app browserI am not sure I get this, how could they switch out the in-app browser you have in your app (lets say you use the native safari on iOs) for their malicious browser?
bulky-holiday-60244
08/19/2022, 12:12 PMI am not sure I get this, how could they switch out the in-app browser you have in your app (lets say you use the native safari on iOs) for their malicious browser?I was referring to a phishing app, so let's say my app package name is "com.myapp.app", they would mimic the "home UI with login buttons" and publish it as "com.phishingapp.app" with same name on the store (or almost the same name) and try to promote the app. It was an argument in the past to switch over login in the browser on mobile (because since an app is fullscreen you don't know if it's the real one if you didn't pay attention in the store) But today I don't know if that's still something used?
magnificent-energy-493
high-optician-2097
crooked-addition-99088
08/19/2022, 7:22 PM