Deprecated skipStateCheck
flag
#706
-
To preface, perhaps this should also be in the Is it really necessary for the For example, I have a fully serverless application, so how is it possible to maintain state between user-agent requests in order to be able to retrieve the correct I suspect the answer will be to use HTTP cookies or just deal with the deprecated warning (e.g. here), but just wanted to check. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 12 replies
-
For example - encrypted cookies, persistant kv storage, anything we generally tend to use in web apps to maintain state. If you use state for, well, state and have no other means of csrf or code injection protection (pkce, oidc nonce) and the deprecation warning was the reason you stopped to think about why you shouldn't have the need to use it? Yeah, it's doing the job I envisioned for it. if you do use cookie based pkce (as you should anyway) then ignore the warning, just make sure your state is signed and cannot be forged. |
Beta Was this translation helpful? Give feedback.
It wouldn't. The entire premise of this discussion was that you assumed to have a valid reason to skip checking the state and the deprecation was getting in the way of using it, where in reality using smth along the lines of
draft-bradley-oauth-jwt-encoded-state-09
is the only acceptable way skipping it and that's only because you'll have to validate it yourself (and frankly nobody implements that anyway). The deprecation did exactly as I hoped it would in this particular case.FWIW if there was a better way of visually marking this as dangerous I would.