Configure and use your organization’s custom OAuth 2 applications using PKCE flow
PKCE is a secure authorization flow that works well with dynamically refreshing applications such as mobile apps, but is valuable across all OAuth2 clients. Instead of a static client secret, PKCE uses a dynamically generated string, eliminating the risk of a leaked client secret.
PKCE overview
A PKCE flow has the following steps. The steps in this section are presented for information only. To perform these procedures, see other sections in this article.
-
The client creates the
code_challenge
by transforming thecode_verifier
usingS256
encryption. -
The client directs the browser to the OAuth2 sign-in page, along with the generated
code_challenge
. You must register your app (Client) so that OAuth2 can accept the authorization request. After registration, your app can redirect the browser to OAuth2. -
The OAuth2 Authorization Server redirects the authentication prompt to the User.
-
The User authenticates using one of the configured login options, and may see a consent page listing the permissions OAuth2 will give to the application.
-
OAuth2 redirects back to your application with an
authorization code
. -
Your application sends this code, along with the
code_verifier
, to OAuth2. -
OAuth2 Authorization Server transforms the
code_verifier
using thecode_challenge_method
from the initial authorization request, and checks the result against thecode_challenge
. If the value of both strings match, then the server has verified that the requests came from the same client and will issue anaccess token
. -
OAuth2 returns the
access token
, and optionally arefresh token
. -
Your application can now use these tokens to call the resource server such as an API on behalf of the user.
-
The resource server validates the token before responding to the request.
Configure your application
Before you can implement authorization, you need to register your app in OAuth2 by creating an app integration from Workfront.
For instructions on creating the OAuth2 application, see Create an OAuth2 single-page web application using PKCEin Create OAuth2 applications for Workfront integrations
Create the Proof Key for Code Exchange
Similar to the standard Authorization Code flow, your app starts by redirecting the user’s browser to your Authorization Server’s /authorize
endpoint. However, in this instance you also have to pass along a code challenge.
Your first step is to generate a code verifier and challenge.
You must add code in your client app to create the code verifier and code challenge.
The PKCE generator code creates output similar to the following:
code language-none |
---|
|
Your app saves the code_verifier
for later, and sends the code_challenge
along with the authorization request to your Authorization Server’s /authorize
URL.
Request an authorization code
If you are using the default Custom Authorization Server, then your request URL would be similar to the following:
code language-none |
---|
|
Note the parameters that are being passed:
-
client_id
 matches the Client ID of the OAuth2 application that you created in the when configuring the application.For instructions, see Create an OAuth2 single-page web application using PKCE in Create OAuth2 applications for Workfront integrations.
-
response_type
Ìý¾±²õÌýcode
, because the application uses the Authorization Code grant type. -
redirect_uri
 is the callback location that the user agent is directed to along with theÂcode
. This must match one of the redirect URls that you specified when you created your OAuth2 application. -
code_challenge_method
 is the hash method used to generate the challenge, which is alwaysÂS256
for Workfront Oauth2 applications that use PKCE. -
code_challenge
 is the code challenge used for PKCE.
Exchange the code for tokens
To exchange the authorization code for an access token, pass it to your Authorization Server’s /token
 endpoint along with the code_verifier
.
code language-none |
---|
|
Note the parameters that are being passed:
-
grant_type
Ìý¾±²õÌýauthorization_code
, because the app uses the the Authorization Code grant type. -
redirect_uri
 must match the URI that was used to get the authorization code. -
code
 is the authorization code that you received from the /authorize endpoint. -
code_verifier
 is the PKCE code verifier that your app generated in Create the Proof Key for Code Exchange. -
client_id
 identifies your client and must match the value preregistered in OAuth2.
If the code is still valid, and the code verifier matches, your application receives an access token.
code language-none |
---|
|
Validate the access token
When your application passes a request with an access token, the resource server needs to validate it.
You can validate your access token with an API call similar to the following:
code language-none |
---|
|
Request a refresh token
To request a refresh token, you can make a POST call to the API, similar to the following:
code language-none |
---|
|