Add your description here
Project description
- The "Big Four" (The Originals)
These were the first four flows ever created in the original 2012 rulebook (RFC 6749).
Authorization Code Flow: The "Permission Slip." You get a temporary code and swap it for a badge. (Best for Web Apps).
Implicit Flow: The "Shortcut." The badge is given directly in the URL. (Now considered Dangerous/Legacy).
Resource Owner Password Credentials: The "House Keys." You give your password directly to the app. (Now Forbidden/Legacy).
Client Credentials Flow: The "Robot ID." The app logs in as itself to do its own chores. (Best for Server-to-Server).
- The "Modern Standard" (The Must-Have)
This is the update that made the internet much safer.
Authorization Code + PKCE: The "Secret Handshake." It’s the standard Authorization Code flow but adds a scrambled secret word so no one can steal the ticket. (The Gold Standard for everything today).
- The "Special Devices" Flow
For things that don't have a normal browser or keyboard.
Device Authorization Grant: The "TV Code." The TV shows a code, you type it into your phone to log in. (RFC 8628). (Best for Smart TVs, CLI tools, and IoT).
- The "Maintenance" Flow
This isn't for logging in the first time; it's for staying logged in.
Refresh Token Flow: The "Badge Renewer." When your 1-hour VIP badge expires, you use a special "Refresh Token" to get a new one without typing your password again.
- The "Assertion" Flows (The Translators)
These are used when you already have one kind of proof and need to swap it for an OAuth badge.
SAML 2.0 Bearer: The "Enterprise Translator." Swapping an old-school XML "Official Letter" for a modern badge. (RFC 7522).
JWT Bearer: The "Digital Signature." Swapping a signed digital note for a badge. Used for high-security machine talk. (RFC 7523).
- The "Upgrade & Swap" Flows
The newest tools for complex systems with many parts.
Token Exchange: The "Badge Swap." Trading a badge for one building for a badge for a different building. (RFC 8693).
Token Delegation: (Part of Token Exchange). When an app says, "I'm acting for Bob, give me a token that proves I'm his assistant."
- The "Rare/Extended" Flows
You might see these in very specific high-level setups.
Ciba (Client Initiated Backchannel Authentication): The "Ping My Phone." Instead of a redirect, the app pings your phone directly and asks, "Is this you?" You click "Yes" on your phone, and the app logs in. (Common in banking apps).
OpenID Connect (OIDC): While technically a "layer" on top of OAuth2, it adds the ID Token (The "ID Card") which tells the app exactly who you are (name, email, photo), whereas OAuth2 only tells the app what it is allowed to do.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file httpx_oauth2_flows-0.6.0.tar.gz.
File metadata
- Download URL: httpx_oauth2_flows-0.6.0.tar.gz
- Upload date:
- Size: 20.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.6 {"installer":{"name":"uv","version":"0.10.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Alpine Linux","version":"3.23.3","id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
911097cc170c175f4678e38f4d8942ae4fdf5b96605b7b4b5da6f5d79512bc72
|
|
| MD5 |
27ac744d66613e2748569c2214222c7d
|
|
| BLAKE2b-256 |
12c00e8cdea426f4436e119282018a28238abf7a4e4eddbba9f547a0d2210200
|
File details
Details for the file httpx_oauth2_flows-0.6.0-py3-none-any.whl.
File metadata
- Download URL: httpx_oauth2_flows-0.6.0-py3-none-any.whl
- Upload date:
- Size: 28.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.6 {"installer":{"name":"uv","version":"0.10.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Alpine Linux","version":"3.23.3","id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7f1c10ec561dd6c6b183abb1c6240b5f4d87b8fc13585e19be6dac590cf30595
|
|
| MD5 |
ce2c52034ecc8ac7e62c1f523b39b5c0
|
|
| BLAKE2b-256 |
74bea4a9d15284a9d49c16b9b06b1a999863d495badfc1d89d8a7b5f425baf4a
|