logoalt Hacker News

paulddrapertoday at 6:03 AM0 repliesview on HN

OAuth 1a was simpler or at least straightforward.

It doesn’t seem that way on the surface. But once your finished with out of band callback validation, localhost, refresh tokens, and PKCE, you realize what a monster OAuth 2 actually is.