Replies: 1 comment 1 reply
-
Hi @panva, resurrecting this thread to add a bit more context to the question, as I'm trying to understand safe handling of The
However, this advice seems to have been weakened in the v6 README:
In 2021 you recommended:
Then again, last week (2024) you said:
"Encrypted" is unambiguous advice, but as in the question above, "tamper-proof" could mean a signed cookie (as is common with e.g. expressJS's In addition to this, signing the What are the risks of sharing a non-encrypted |
Beta Was this translation helpful? Give feedback.
-
According to the Authorization Code Flow example in the README, you should "store the code_verifier in your framework's session mechanism, if it is a cookie based solution it should be httpOnly (not readable by javascript) and encrypted."
Is it necessary for it to be encrypted, or is it sufficient if it is simply signed? My framework signs session cookies, but I don't believe it encrypts them. (In my case, the framework in question is Remix.)
Beta Was this translation helpful? Give feedback.
All reactions