-
-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use system browser for OAuth authentification #2650
Comments
This issue blocks my usage of Bruno on my system. My organisations authorisation does not allow the Electron browser to be used. |
+1 Due to this issue, we are not able to use Bruno at my organization. @helloanoop Please help here. |
My thoughs: this request is not impossible, but may still be not ideal in the environments where the organization has very strict requirements about software you use. The oauth2 browser flow would start with bruno executing shell request to open Authorization URL. It would normally be a https request, and it would be handled by the default browser loading the login page. First potential, albeit minor problems here are:
The more important problem is the core of how OAuth2 works: after the successful authorization the browser is supposed to redirect to the Callback URL. This redirect carries credentials that we are interested in, but they must somehow return back to Bruno. Currently, as Bruno is handling the browsers function, it simply extracts the credentials and ignores the redirect uri completely, but the browser will not do that. This creates another set of problems:
The first question is about whether the authorization server allows arbitrary callback urls. If not - the url to Bruno must be explicitly whitelisted in the server configuration. This in itself may be considered security violation, depending on the type of application, or the user may simply not have that kind of access, in which case it's game over. The second question is a main technical challenge for Bruno developers. From what I understand electron applications may be registered as custom protocol clients, and in fact Bruno does register itself as a client for And of course, your desktop security policy must not be too strict for that either - if you are not able to register custom protocol clients, it's game over again. Then again, since Postman gets away with just that, it can't be a real world problem. |
I +1 this. The internal browser used doesn't send the device identifier to e.g. microsoft. With that there are restrictions that a login isn't possible to specific accounts. It's also the only thing holding me back to buy and use bruno and to recommend it to the whole company. |
+1 on this. Same reasons as most people above: a nice to have in order to use password managers, but also because the organiation policy doesn't allow me to login using the embedded browser. |
This has been a pain in our organization as well where we require users use a company provided password manager and MFA everywhere. Would love to see this implemented so we can continue to expand our Bruno usage. |
Coupled with implicit mode, as it's the only allowed method in our companty |
I have no idea what exactly is the reason, but our company login server does some strange redirects that don't work in the integrated browser. We had the same issue in Postman, but there is a "Authorize using browser" option which enables using the standard browser. |
I have checked the following:
Describe the feature you want to add
For Oauth2 authentifiction, (and for others eventually), when clicking on "Get Access Token", the system's browser should be opened (not the bruno integrated one).
Why that? It will allow users to have access to theirs password managers configured on theirs browser. It's a cool feature that make life easier.
Mockups or Images of the feature
See as postman is working.
The text was updated successfully, but these errors were encountered: