Skip to content

Commit

Permalink
Merge pull request #133 from lu-zero/typos
Browse files Browse the repository at this point in the history
Fix a couple of typos
  • Loading branch information
divarvel authored May 4, 2024
2 parents 5ab487d + 5f26e4e commit 4605ebd
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion content/blog/oauth-oidc.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ The different authorization flows target different use cases, like mobile applic
Let's consider this scenario:
* the user is connected to service A, a resource server and authorization server
* services B and C use OAuth access to service A for authentication: they redirect the user to service A to get an access token, then test the access token can actually access the resources
* the user connects to B and C using service A, so B and C recieved access token for the user's ressources on A
* the user connects to B and C using service A, so B and C received access token for the user's resources on A
* now, the malicious admin of service C wants to access service B. They start the OAuth authoization to service B, but at the point where they are redirected to A, and must return the new access token, they instead provide the token they already have for the user
* B checks that the token is valid, and lets them in

Expand Down

0 comments on commit 4605ebd

Please sign in to comment.