Bad examples.
I think all the above examples need to be reviewed as almost none work.
also requirements to us these flows is not mentioned , probably with good reason as building a secure web authentication server to use this flow is an insane ask of independent developers.
3
votes
SabaKadar
shared this idea