Skip to main content

Add your description here

Project description

  1. The "Big Four" (The Originals)

These were the first four flows ever created in the original 2012 rulebook (RFC 6749).

Authorization Code Flow: The "Permission Slip." You get a temporary code and swap it for a badge. (Best for Web Apps).

Implicit Flow: The "Shortcut." The badge is given directly in the URL. (Now considered Dangerous/Legacy).

Resource Owner Password Credentials: The "House Keys." You give your password directly to the app. (Now Forbidden/Legacy).

Client Credentials Flow: The "Robot ID." The app logs in as itself to do its own chores. (Best for Server-to-Server).
  1. The "Modern Standard" (The Must-Have)

This is the update that made the internet much safer.

Authorization Code + PKCE: The "Secret Handshake." It’s the standard Authorization Code flow but adds a scrambled secret word so no one can steal the ticket. (The Gold Standard for everything today).
  1. The "Special Devices" Flow

For things that don't have a normal browser or keyboard.

Device Authorization Grant: The "TV Code." The TV shows a code, you type it into your phone to log in. (RFC 8628). (Best for Smart TVs, CLI tools, and IoT).
  1. The "Maintenance" Flow

This isn't for logging in the first time; it's for staying logged in.

Refresh Token Flow: The "Badge Renewer." When your 1-hour VIP badge expires, you use a special "Refresh Token" to get a new one without typing your password again.
  1. The "Assertion" Flows (The Translators)

These are used when you already have one kind of proof and need to swap it for an OAuth badge.

SAML 2.0 Bearer: The "Enterprise Translator." Swapping an old-school XML "Official Letter" for a modern badge. (RFC 7522).

JWT Bearer: The "Digital Signature." Swapping a signed digital note for a badge. Used for high-security machine talk. (RFC 7523).
  1. The "Upgrade & Swap" Flows

The newest tools for complex systems with many parts.

Token Exchange: The "Badge Swap." Trading a badge for one building for a badge for a different building. (RFC 8693).

Token Delegation: (Part of Token Exchange). When an app says, "I'm acting for Bob, give me a token that proves I'm his assistant."
  1. The "Rare/Extended" Flows

You might see these in very specific high-level setups.

Ciba (Client Initiated Backchannel Authentication): The "Ping My Phone." Instead of a redirect, the app pings your phone directly and asks, "Is this you?" You click "Yes" on your phone, and the app logs in. (Common in banking apps).

OpenID Connect (OIDC): While technically a "layer" on top of OAuth2, it adds the ID Token (The "ID Card") which tells the app exactly who you are (name, email, photo), whereas OAuth2 only tells the app what it is allowed to do.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

httpx_oauth2_flows-0.2.0.tar.gz (20.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

httpx_oauth2_flows-0.2.0-py3-none-any.whl (28.2 kB view details)

Uploaded Python 3

File details

Details for the file httpx_oauth2_flows-0.2.0.tar.gz.

File metadata

  • Download URL: httpx_oauth2_flows-0.2.0.tar.gz
  • Upload date:
  • Size: 20.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.4 {"installer":{"name":"uv","version":"0.10.4","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Alpine Linux","version":"3.23.3","id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for httpx_oauth2_flows-0.2.0.tar.gz
Algorithm Hash digest
SHA256 a80d967a7aeb57f99d28a2ddbe0f1d659a02337e4536f29ad87b1e5b40f5e22b
MD5 66c87b4fb35e446b296cb23cffa1a4e4
BLAKE2b-256 c5d3974de44f401af2013c7da77d96790ea3a8f90b2d7643cd103c3b5fc09011

See more details on using hashes here.

File details

Details for the file httpx_oauth2_flows-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: httpx_oauth2_flows-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 28.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.4 {"installer":{"name":"uv","version":"0.10.4","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Alpine Linux","version":"3.23.3","id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for httpx_oauth2_flows-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 927f5f2175b3057c0d0c0b680260f2ae7c79d713b6f2c1e84fb9fd0ee47f3941
MD5 159fea20c21ffb5f24edd9109dfe329e
BLAKE2b-256 f1237318db77f4a2c60ca3be936fd0df615a051ef741e3f397ae4ff31323c23b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page