June 4, 2024, 7:49 p.m. | Alexey

DEV Community dev.to

This article will review the principles behind various OpenID Connect (OIDC) authentication flows, from the simplest to the most modern, highlighting the vulnerabilities present in each.


We will explore each of the following OpenID Connect flows in detail:


Frontend-only implementations:



  • Implicit Flow

  • Authorization Code Flow with Proof Key for Code Exchange (PKCE)


Frontend and Backend implementations:



  • Authorization Code Flow with Token-Mediating Backend

  • Authorization Code Flow with Token-Mediating Backend and PKCE

  • Authorization Code Flow with PKCE and Backend for Frontend (BFF) …

article authentication authorization code connect flow frontend key oauth2 oidc openid openid connect principles proof review security vulnerabilities webdev

Data Loss Prevention Analyst 1

@ Advanced Energy | Quezon City, 00, PH, n/a

TC-CS-DPP MS Purview-Staff

@ EY | Bengaluru, KA, IN, 560048

Consultant CSIRT Confirmé H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Consultant Azure Cloud Sécurité CSPM H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Consultant en Protection des Données (Microsoft Purview) H/F (Paris)

@ EY | Paris La Défense, FR, 92037

Business Continuity Coordinator

@ Sumitomo Mitsui Banking Corporation | Brea, CA, US, 92821