Skip to content

Commit 6730380

Browse files
unatasha8vinckr
authored andcommitted
chore: Update device authorization flow steps and formatting
1 parent 87c75d1 commit 6730380

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

docs/oauth2-oidc/device-authorization.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar_label: Device authorization flow
55
---
66

77
The OAuth 2.0 Device Authorization Grant (RFC 8628) brings OAuth to devices with internet connectivity but limited input
8-
capabilities. This flow is designed for smart TVs, streaming devices, IoT hardware, printers, AI agents and other connected devices
8+
capabilities. This flow is designed for smart TVs, streaming devices, IoT hardware, printers, AI agents, and other connected devices
99
where typing credentials isn't practical. Here's how it works: the device to be authenticated displays a URL and a short code, prompting
1010
you to open that URL on your phone or computer to authorize access. The two devices don't need to communicate directly—the authorization
1111
happens through the OAuth provider.
@@ -24,13 +24,13 @@ Here is the high-level overview for the device authorization grant flow:
2424
1. In the meantime, the device polls the authorization server. Once the user authenticates and grants access, the authenicaton server
2525
sends an access token to the device, which is used to access the protected resource.
2626

27-
### Device requests authorization
27+
### Step 1: Device requests authorization
2828

2929
The user attempts to log in through the limited input device. The device sends a POST request to the authorization server to initiate
3030
the flow with the following parameters:
3131

32-
- `client_id`: The ID of the client (device) that's making the request.
33-
- `scope` (optional): The scope of the access request, which specifies which resources the requesting device can access.
32+
- `client_id`: The ID of the client (device) that's making the request
33+
- `scope` (optional): The scope of the access request, which specifies which resources the requesting device can access
3434

3535
The authorization server responds with the following information:
3636

@@ -41,17 +41,17 @@ The authorization server responds with the following information:
4141
- `expires_in`: The lifespan of the device code (in seconds)
4242
- `interval`: The polling interval (in seconds) for the client to check if the user has authorized the device yet
4343

44-
### Display user code and verification URI
44+
### Step 2: Display user code and verification URI
4545

4646
The device shows the user the `user_code` and `verification_uri` it received from the authorization server.
4747

48-
### User grants permission
48+
### Step 3: User grants permission
4949

5050
The user visits the provided URI on a separate device, such as a phone, and enters the code. Once the user enters the code,
5151
the user is prompted to log in, if not already authenticated, and grants or denies permission to the client (device). After granting
5252
permission, the user is redirected to a page confirming they are successfully logged in.
5353

54-
### Device polls for the access token
54+
### Step 4: Device polls for the access token
5555

5656
While the user is authorizing the device, the device polls the `token` endpoint of the authorization server to check whether the
5757
user has completed the authorization process, by making a POST request with the following parameters:

0 commit comments

Comments
 (0)