Skip to content

Client credentials processor#45

Open
mjbraun wants to merge 2 commits intomainfrom
client-credentials-processor
Open

Client credentials processor#45
mjbraun wants to merge 2 commits intomainfrom
client-credentials-processor

Conversation

@mjbraun
Copy link
Copy Markdown
Contributor

@mjbraun mjbraun commented Apr 2, 2026

HelpScout (and other API platforms) use the OAuth2 client_credentials grant for M2M auth, which tokenizer had no native support for. Without it, the client secret had to be stored and managed outside tokenizer, defeating the point, or the token had to be continually refreshed.

Implements RFC 6749 §4.4 following the same two-step sealed pattern as jwt_processor - the caller never sees the plaintext secret or access token.
Also extracts a shared sealTokenResponse helper so JWT and client_credentials don't duplicate the response-sealing logic.

mjbraun added 2 commits April 1, 2026 19:38
Implements the client_credentials grant (RFC 6749 §4.4) following the
same two-step sealed pattern as JWTProcessorConfig - the caller never
sees the plaintext secret or access token.

Also extracts a shared sealTokenResponse helper from JWTProcessorConfig
so both processors share the response-sealing logic without duplication.
@mjbraun mjbraun requested a review from timflyio April 2, 2026 01:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants