Replies: 2 comments 4 replies
-
Hello @bchang11
It doesn't. The Origin header behaviour is deferred to the fetch implementation native to the environment it's executed in.
... these should then all be confidential clients.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi @panva,
I’ve designed my architecture to store all necessary information for OIDC
(e.g., code_verifier, state, etc.)
in my server session. For confidentiality, I handle the code exchange for tokens on the server side for both public and confidential clients.I have a few questions about how
openid-client
manages theOrigin
header during this process.openid-client
automatically attach anOrigin
header to requests by default?customFetch
to set theOrigin
header manually for cross-origin requests. However, I’m unsure ifclient.authorizationCodeGrant()
has any built-in capability to manage headers, such asOrigin
, without relying on customFetch.Without using the
customFetch
to explicit set theOrigin
header and attempting to exchange for Token from my public client, Azure AD responds:I’d appreciate any guidance on whether handling the
Origin
header this way is necessary or if there are best practices within openid-client for managing headers during token exchanges.Beta Was this translation helpful? Give feedback.
All reactions