Skip to main content

Add your description here

Project description

  1. The "Big Four" (The Originals)

These were the first four flows ever created in the original 2012 rulebook (RFC 6749).

Authorization Code Flow: The "Permission Slip." You get a temporary code and swap it for a badge. (Best for Web Apps).

Implicit Flow: The "Shortcut." The badge is given directly in the URL. (Now considered Dangerous/Legacy).

Resource Owner Password Credentials: The "House Keys." You give your password directly to the app. (Now Forbidden/Legacy).

Client Credentials Flow: The "Robot ID." The app logs in as itself to do its own chores. (Best for Server-to-Server).
  1. The "Modern Standard" (The Must-Have)

This is the update that made the internet much safer.

Authorization Code + PKCE: The "Secret Handshake." It’s the standard Authorization Code flow but adds a scrambled secret word so no one can steal the ticket. (The Gold Standard for everything today).
  1. The "Special Devices" Flow

For things that don't have a normal browser or keyboard.

Device Authorization Grant: The "TV Code." The TV shows a code, you type it into your phone to log in. (RFC 8628). (Best for Smart TVs, CLI tools, and IoT).
  1. The "Maintenance" Flow

This isn't for logging in the first time; it's for staying logged in.

Refresh Token Flow: The "Badge Renewer." When your 1-hour VIP badge expires, you use a special "Refresh Token" to get a new one without typing your password again.
  1. The "Assertion" Flows (The Translators)

These are used when you already have one kind of proof and need to swap it for an OAuth badge.

SAML 2.0 Bearer: The "Enterprise Translator." Swapping an old-school XML "Official Letter" for a modern badge. (RFC 7522).

JWT Bearer: The "Digital Signature." Swapping a signed digital note for a badge. Used for high-security machine talk. (RFC 7523).
  1. The "Upgrade & Swap" Flows

The newest tools for complex systems with many parts.

Token Exchange: The "Badge Swap." Trading a badge for one building for a badge for a different building. (RFC 8693).

Token Delegation: (Part of Token Exchange). When an app says, "I'm acting for Bob, give me a token that proves I'm his assistant."
  1. The "Rare/Extended" Flows

You might see these in very specific high-level setups.

Ciba (Client Initiated Backchannel Authentication): The "Ping My Phone." Instead of a redirect, the app pings your phone directly and asks, "Is this you?" You click "Yes" on your phone, and the app logs in. (Common in banking apps).

OpenID Connect (OIDC): While technically a "layer" on top of OAuth2, it adds the ID Token (The "ID Card") which tells the app exactly who you are (name, email, photo), whereas OAuth2 only tells the app what it is allowed to do.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

httpx_oauth2_flows-0.1.1.tar.gz (20.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

httpx_oauth2_flows-0.1.1-py3-none-any.whl (27.9 kB view details)

Uploaded Python 3

File details

Details for the file httpx_oauth2_flows-0.1.1.tar.gz.

File metadata

  • Download URL: httpx_oauth2_flows-0.1.1.tar.gz
  • Upload date:
  • Size: 20.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.4 {"installer":{"name":"uv","version":"0.10.4","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Alpine Linux","version":"3.23.3","id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for httpx_oauth2_flows-0.1.1.tar.gz
Algorithm Hash digest
SHA256 0f03b659c880c0a0f0b9d5365a5f24dc7c85b3825a553c80f1efd9117cf5f5a4
MD5 2cf7af10ab3d6603d78c920c53b5dc43
BLAKE2b-256 52037f12fba00bde81c96d7046036f9612698f0b3f7c3013698fc0f8f10d7570

See more details on using hashes here.

File details

Details for the file httpx_oauth2_flows-0.1.1-py3-none-any.whl.

File metadata

  • Download URL: httpx_oauth2_flows-0.1.1-py3-none-any.whl
  • Upload date:
  • Size: 27.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.4 {"installer":{"name":"uv","version":"0.10.4","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Alpine Linux","version":"3.23.3","id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for httpx_oauth2_flows-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 942912e5d72c17b46204ae0f5c5f3431d366ff3a7387b1ad660aadefa175b6bf
MD5 ef5c6a5984f73f7e542f45c641a54e3d
BLAKE2b-256 685748b9288fe7f4ca34fd0cbd9bec4154e09300766f2c60d5460f4f70d3a559

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page