Skip to content

Authorization Code with PKCE

Authorization Code with Proof Key for Code Exchange (PKCE) flow is an extension of the Authorization Code grant flow. However, with PKCE, requests do not need to include the client_secret in the /token request. The PKCE flow reduces security risks for desktop and mobile applications because the client_secret does not need to be embedded in source code.

Authorization Code with PKCE was designed for desktop and mobile apps, but it can be also used in web apps.

  • code_verifier and code_challenge are generated.
  • code_challenge is submitted to /authorize endpoint.
  • The authorization server returns an authorization code.
  • code_verifier and authorization code are submitted to /token endpoint.
  • The server responds with an oauth_code, an id_token, an access_token, and a refresh_token.
  • The access_token is used to authorize the application.

The following is a diagram that shows the Authorization Code with PKCE flow:

Applications using Authorization Code with PKCE must use Serial PKCE to refresh the access token with Trimble Identity. This means that a new (code_verifier, code_challenge) pair must be provided on each token or token refresh request. This creates a request sequence:

Authorization Request (code_challenge1) => Token Request (code_verifier1, code_challenge2) => Token Refresh(code_verifier2, code_challenge3) => …

For more details, check out this OAuth.net resource.

You will need the following information from Trimble:

  • Client name
  • Client id
  • Client secret
  • Callback url

The first step is the generation of a new code verifier and code challenge. This step is repeated for every authorization request.

The code verifier string must meet the following requirements:

  • Include only the following characters: A-Z, a-z, 0-9, punctuation characters ._- or ~ (hyphen, period, underscore, and tilde.)
  • The verifier string must be between 43 and 128 characters long.

The challenge code is a BASE64-URL-encoded string of the SHA256 hash of the code verifier.

After generating the challenge code, it must be submitted to the authorization server in a GET request. The code generated is valid for 10 minutes.

HTTP
GET /oauth/authorize
ParameterDescription
StateThis field is used to return data (like a return URL) after sign-in with an access code.
client_idApplication ID registered for the application (UUID)
response_typecode
scopeopenid and Client name (Scope is space delimited)
redirect_uriRedirect URL registered with Identity
code_challengeCode challenge
code_challenge_methodS256
ui_localesString Locale value. This specifies locale language Identity v4 UI will display. This value is optional.
prompt (optional)How Trimble Identity displays the login UI.
login_hint (optional)Allows an application to specify the email address for use in the sign in or sign up page if you are using prompt=create

Possible values for the optional prompt parameter

Prompt valueDescription
noneTrimble Identity will not display any UI, if there is no SSO session the /authorize call will redirect to the caller with a error
loginTrimble Identity will always display the sign in UI, regardless of whether an SSO session exists
createTrimble Identity will display the sign up page rather than the sign in page

The following is an example of the callback made to your callback endpoint. You will need to parse the code parameter from the callback to use in your token call.

Terminal window
http://localhost:5173/auth/callback?
code=us_9fd5fee3f3c74267910f8ed7c71c85a8&
state=Hn4K-n1m00000CiUUV-vOUNcOJZ8Jh_4shoo

Authorization Server responds with an ID Token and Access Token (and optionally, a Refresh Token).

To later refresh the access token, another (code_verifier, code_challenge) pair needs to be created.

HTTP
POST /oauth/token
HeaderDescription
Acceptapplication/json
Content-Typeapplication/x-www-form-urlencoded
BodyDescription
grant_typeauthorization_code
codeThe authorization code returned from the above call
client_idApplication ID registered for the application
redirect_uriCallback URL registered with Identity
code_verifierCode verifier generated earlier for the Authorization request
code_challenge (optional)A new Code challenge (if token refresh is going to be used)
code_challenge_method (optional)S256 (if token refresh is going to be used)

If the token request succeeds, the server responds with a 200 response code.

FieldDescription
access_tokenThe access token’s primary function is to authorize a user.
refresh_tokenA refresh token is used to obtain access tokens after an initial authorization grant without interaction with the end-user.
expires_inThe duration of time the access token is granted for in seconds
id_tokenAn ID token is an artifact that proves the user has been authenticated. The ID token contains information about the user, such as user name and email, and is used to authenticate a user.
Example response
{
"access_token": "8aca1...",
  "refresh_token": "861e9...",
  "expires_in": 3600,
  "id_token": "eyJhbG...",
}

If the access token expires, it can be refreshed using the one-time refresh token.

Another (code_verifier, code_challenge) pair must be created.

The server will respond with a Token Response.

HTTP
POST /oauth/token
HeaderDescription
Acceptapplication/json
Content-Typeapplication/x-www-form-urlencoded
BodyDescription
grant_typerefresh_token
refresh_tokenThe refresh token from the previous token response
client_idApplication ID registered for the application
code_verifierCode verifier generated for the previous token request
code_challengeA new Code challenge
code_challenge_methodS256

Fork this Postman collection into your own workspace to quickly get started using Authorization Code with PKCE.

You need the following from your Developer Console application:

  • Client name
  • Client id
  • Client secret
  • Callback url

To use with Postman, the Postman callback url (https://oauth.pstmn.io/v1/browser-callback) must be configured for your application.

Run in Postman