Skip to content

Fact Sheet: The Dangers of Using the Password Grant Type with Mobile Applications

Having trouble convincing your colleagues that using the password grant type is a terrible idea? Is the allure of owning the login UI too strong for your design team? Then check out our fact sheet below for quick and easy facts about why you should never use the Resource Owner Password Credentials flow with public clients such as mobile applications.

Download the Fact Sheet.

Why You Should Not Use ROPC for Mobile Applications

Resource Owner Password Credentials flow with public clients is typically used to enable applications to continue to provide login screens. However, there are major security issues.

The Good

  • You get tokenized API access
  • Easy to migrate legacy applications that relied on Basic authentication

The Bad

  • User credentials are exposed to the client application
  • The user and client application are indistinguishable from one another
  • Client applications can request any scope without the user's knowledge
  • You are training your users to be phishable
  • Don't expect it to be speedy (you have to perform password hashing after all)
  • Flies in the face of the OAuth best practice guidelines (RFC8252)
  • No federation
  • No multi-factor authentication
  • No single sign-on

The Ugly

  • Significantly increases the attack surface on user credentials (if the client is compromised, so is the user's entire account)
  • Public client applications cannot keep a secret and therefore cannot authenticate themselves
  • Token endpoint, therefore, becomes an open endpoint that attackers can use to brute force credentials and therefore needs to handle risks such as account enumeration, and credential stuffing
  • The application could be trivially mimicked, and both the user and authorization server would have no way of knowing, allowing an attacker to harvest both user credentials and access tokens

The Solution

The only secure solution is to follow the best practices detailed by the OAuth working group in RFC8252. This involves the use of the authorization code flow, PKCE, in-app browser tabs, and custom URI schemes.

For further details on the downsides of the password grant type, checkout my other article: "Why the Resource Owner Password Credentials Grant Type is not Authentication nor Suitable for Modern Applications".

Who's Using Our Products

Our products and services for IdentityServer are loved by so many. Here are just a few...

  • Hawkins Inc
  • Repower
  • Bosch
  • RandA
  • Plymouth NHS
  • American Heart Association
  • Systopia
  • Deliotte

Awards & Certifications