79°F

Aaron Parecki

  • Articles
  • Notes
  • Photos
  • rabble https://twitter.com/rabble
    So @aaronpk actually provides an example of users being able to edit their names at least in the JS. This makes me feel MUCH MORE comfortable with it. https://twitter.com/aaronpk/status/1137149365120786432
    Portland, Oregon
    Sat, Jun 8, 2019 12:14am +00:00 (liked on Fri, Jun 7, 2019 8:23pm -07:00)
  • Ride
    1.22mi
    Distance
    8:09
    Duration
    6:51pm
    Start
    6:59pm
    End
    Portland, Oregon
    Fri, Jun 7, 2019 6:59pm -07:00
  • Beer
    Portland, Oregon, USA
    Fri, Jun 7, 2019 6:12pm -07:00
  • Ride
    1.36mi
    Distance
    8:15
    Duration
    5:24pm
    Start
    5:33pm
    End
    Portland, Oregon
    Fri, Jun 7, 2019 5:33pm -07:00
  • rabble https://twitter.com/rabble   •   Jun 8
    I hope I’m wrong. Looking at the ui it shows users being able to not provide it but I can’t find info in the code about that.
    Aaron Parecki
    Their docs are wrong in a few places and are missing a lot of info.
    Portland, Oregon, USA
    1 like
    Fri, Jun 7, 2019 5:10pm -07:00
  • rabble https://twitter.com/rabble   •   Jun 7
    @aaronpk Am i correct in reading through the apple sign in that they're protecting the privacy of your email address with a proxy but then giving everybody who asks for it your full legal name?
    Aaron Parecki
    They actually have a way you can edit the name that's sent back to the app!
    Portland, Oregon, USA
    2 likes 1 reply
    Fri, Jun 7, 2019 5:08pm -07:00
  • Ride
    0.95mi
    Distance
    7:30
    Duration
    4:50pm
    Start
    4:57pm
    End
    Portland, Oregon
    Fri, Jun 7, 2019 4:57pm -07:00
  • Rory Macdonald https://twitter.com/tworymacdonald   •   Jun 7
    Nice write up πŸ‘ Did you find the anti-fraud Real User Indicator capability surfaced using JS API? Available as credential.realUserStatus property in native.
    Aaron Parecki
    Nope, haven't found that yet! It's missing from their docs too. I'm going to keep playing with it though.
    Portland, Oregon
    1 like
    Fri, Jun 7, 2019 12:39pm -07:00
  • Render Snarky Comments in Comic Sans (www.zachleat.com)
    Fri, Jun 7, 2019 12:13pm -07:00 #indieweb
  • 9:43pm
    Asleep
    5:21am
    Awake
    7h 38m
    Slept
    16m
    Awake for
    Portland, Oregon, USA
    Fri, Jun 7, 2019 5:21am -07:00
  • Aaron Parecki
    Contributions from: Denmark, Netherlands, Poland, United Kingdom, United States
    Fri, Jun 7, 2019 3:08am -07:00
  • David Waite https://twitter.com/dwaite   •   Jun 6
    @aaronpk Most surprisingly interesting thing I got from https://developer.okta.com/blog/2019/06/04/what-the-heck-is-sign-in-with-apple - you managed to get http://example-app.com
    Aaron Parecki
    πŸ˜‚πŸ˜‚πŸ˜‚ Yep I use it in my book and I've also been using it for testing out redirect URIs in workshops and stuff!
    Portland, Oregon
    1 reply
    Thu, Jun 6, 2019 4:46pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    Just for the uniqueid. Verify that the uniqueid is not modified.
    Aaron Parecki
    verify where? The unique ID comes back in the ID token not the access token. (also happy to take this to DM)
    Portland, Oregon
    Thu, Jun 6, 2019 4:20pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    So talked with the Apple engineers here at WWDC:
    They don't have that endpoint, they also will not expose user_info or a revocation endpoint. The user_info will only be sent once and only once then you will only get a unique id again. Only scopes available now are name and email
    Aaron Parecki
    Another question, if there is no `user_info` endpoint, what are the access token and refresh tokens for?
    Portland, Oregon
    1 reply
    Thu, Jun 6, 2019 4:18pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    Yep. That seems like a bug. If you forget it well you are left without it. You should be able to request new scopes...
    Aaron Parecki
    Progress! I now get the screen which lets me edit my name and choose the email to share. I only see that the first time, all subsequent requests show a confirmation only.

    Still no luck actually getting the email address back in the ID token though.
    Portland, Oregon
    1 like
    Thu, Jun 6, 2019 4:07pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    That is not a bug that is feature. They told me they will only give you the info once. Probably why scope won’t matter after your first invoke.
    Aaron Parecki
    I will go test this out with new app credentials though to confirm. Thanks for the lead!
    Portland, Oregon
    1 like
    Thu, Jun 6, 2019 3:28pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    That is not a bug that is feature. They told me they will only give you the info once. Probably why scope won’t matter after your first invoke.
    Aaron Parecki
    interesting. well the bug is that I have *never* gotten it, because I didn't request it the first time, and now I can't request it ever again.
    Portland, Oregon
    1 reply
    Thu, Jun 6, 2019 3:28pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    So talked with the Apple engineers here at WWDC:
    They don't have that endpoint, they also will not expose user_info or a revocation endpoint. The user_info will only be sent once and only once then you will only get a unique id again. Only scopes available now are name and email
    Aaron Parecki
    Just verified again, and I don't get back name or email address when I request "name email" scope.

    I did find a bug where apparently Apple is ignoring the "scope" parameter after the very first time you authorize an app though, so could be related.
    Portland, Oregon
    3 replies
    Thu, Jun 6, 2019 2:26pm -07:00
  • Wizages - Sam Patzer https://twitter.com/Wizages   •   Jun 6
    So talked with the Apple engineers here at WWDC:
    They don't have that endpoint, they also will not expose user_info or a revocation endpoint. The user_info will only be sent once and only once then you will only get a unique id again. Only scopes available now are name and email
    Aaron Parecki
    Brilliant, thanks for the info!

    Have you been able to successfully request name and email scope yet? It wasn't working in my testing.
    Portland, Oregon
    Thu, Jun 6, 2019 2:22pm -07:00
  • mefarazath https://github.com/mefarazath   •   Jun 6

    #1 Having 'scope' parameter in the authorization request seems to cause login failures

    Aaron Parecki
    Thank you! You helped me track down a deeper problem!

    It turns out that you're right, having `scope` in the request causes Apple to return a 500 server error when confirming the login on their site before it redirects back to the app.

    **However**, the really weird part is that Apple apparently completely ignores the `scope` parameter the second time you log in to an app, so there is no error.

    The very first time I logged in to an app while testing this code I didn't include the `scope` parameter, so it worked. Then I added the parameter to see if I could get it to return an email address, and it didn't. It also didn't fail, because I had already logged in once.

    I was having trouble logging in with a new App ID I created, and this is the reason! I just tried removing the scope from my attempt and now I'm able to log in with new App IDs.

    This is very inconsistent behavior by Apple, so I hope they fix it later.
    Portland, Oregon, USA
    Thu, Jun 6, 2019 12:29pm -07:00
older

Hi, I'm Aaron Parecki, Director of Identity Standards at Okta, and co-founder of IndieWebCamp. I maintain oauth.net, write and consult about OAuth, and participate in the OAuth Working Group at the IETF. I also help people learn about video production and livestreaming. (detailed bio)

I've been tracking my location since 2008 and I wrote 100 songs in 100 days. I've spoken at conferences around the world about owning your data, OAuth, quantified self, and explained why R is a vowel. Read more.

  • Director of Identity Standards at Okta
  • IndieWebCamp Founder
  • OAuth WG Editor
  • OpenID Board Member

  • πŸŽ₯ YouTube Tutorials and Reviews
  • 🏠 We're building a triplex!
  • ⭐️ Life Stack
  • βš™οΈ Home Automation
  • All
  • Articles
  • Bookmarks
  • Notes
  • Photos
  • Replies
  • Reviews
  • Trips
  • Videos
  • Contact
© 1999-2025 by Aaron Parecki. Powered by p3k. This site supports Webmention.
Except where otherwise noted, text content on this site is licensed under a Creative Commons Attribution 3.0 License.
IndieWebCamp Microformats Webmention W3C HTML5 Creative Commons
WeChat ID
aaronpk_tv