<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to make sure clients dont misuse access tokens provided to them? in Dropbox API Support &amp; Feedback</title>
    <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123864#M3609</link>
    <description>&lt;P&gt;Thanks, but how are other desktop apps handling this? Tunneling the traffic through my service seems a bad choice to me since it will create a lot of extra cost and pose an additional security risk for the client (since his/her data is passing through another third-party service before going to Dropbox).&lt;/P&gt;</description>
    <pubDate>Mon, 16 Feb 2015 21:14:02 GMT</pubDate>
    <dc:creator>Andreas D.8</dc:creator>
    <dc:date>2015-02-16T21:14:02Z</dc:date>
    <item>
      <title>How to make sure clients dont misuse access tokens provided to them?</title>
      <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123862#M3607</link>
      <description>&lt;P&gt;I want to develop a Dropbox Desktop app that would retrieve an access token via a web service (which in turn would perform OAuth2 authentication and then give the user a magic key that he can enter in his desktop app to retrieve a valid access token) and store this access token on the client's machine (so that the client can acess the Dropbox API without going through the backend of my service). Now, as the client has access to the token (or at least could extract it from the application), he could make calls to the API himself and possibly misuse this by performing e.g. too many calls. Since the access token will be associated to my application it could lead to a ban I imagine. Is there any way to make sure that users don't misuse access tokens provided to them, or to monitor usage of individual tokens and possibly revoke them?&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 09:45:08 GMT</pubDate>
      <guid>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123862#M3607</guid>
      <dc:creator>Andreas D.8</dc:creator>
      <dc:date>2019-05-29T09:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to make sure clients dont misuse access tokens provided to them?</title>
      <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123863#M3608</link>
      <description>&lt;P&gt;Run your own web service and tunnel all Dropbox access via that.  Other than that, if both the application token and the client token is available to me locally, there's absolutely nothing you can do to stop me extracting and using them.  You have already put them in an environment you cannot control, so there is nothing you can do to ultimately secure them from a determined attacker.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 20:29:18 GMT</pubDate>
      <guid>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123863#M3608</guid>
      <dc:creator>Richard P.</dc:creator>
      <dc:date>2015-02-16T20:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to make sure clients dont misuse access tokens provided to them?</title>
      <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123864#M3609</link>
      <description>&lt;P&gt;Thanks, but how are other desktop apps handling this? Tunneling the traffic through my service seems a bad choice to me since it will create a lot of extra cost and pose an additional security risk for the client (since his/her data is passing through another third-party service before going to Dropbox).&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 21:14:02 GMT</pubDate>
      <guid>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123864#M3609</guid>
      <dc:creator>Andreas D.8</dc:creator>
      <dc:date>2015-02-16T21:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to make sure clients dont misuse access tokens provided to them?</title>
      <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123865#M3610</link>
      <description>&lt;P&gt;Other desktop apps probably aren't worrying about it - its no different to the situation with Android apps etc in reality.  If someone wants your app key, then when its on a users device its trivial to get at.&lt;/P&gt;

&lt;P&gt;Data going through your service wouldn't be a security issue, as they are already fine with it going through your app and your app could be doing anything at all.  But yes, it would be expensive - but thats the trade off.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 21:27:17 GMT</pubDate>
      <guid>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123865#M3610</guid>
      <dc:creator>Richard P.</dc:creator>
      <dc:date>2015-02-16T21:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to make sure clients dont misuse access tokens provided to them?</title>
      <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123866#M3611</link>
      <description>&lt;P&gt;OK I see, just wanted to know how other people handle this, as you said it's the same issue for Android apps etc. I think this problem can't be solved using the normal OAuth2 flow, since what would be needed is a way to authorize individual requests of the client trough the my backend (i.e. client asks backend to allow him to call a given endpoint URL through the Dropbox API, the backend requests authorization for this from the Dropbox API and sends the client a one-time access code for this). Rate-limiting of individual client access tokens would be another solution I guess.&lt;/P&gt;

&lt;P&gt;So, final question: Is it considered acceptable to provide a desktop application with an access token obtained through the API then?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 21:41:32 GMT</pubDate>
      <guid>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123866#M3611</guid>
      <dc:creator>Andreas D.8</dc:creator>
      <dc:date>2015-02-16T21:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to make sure clients dont misuse access tokens provided to them?</title>
      <link>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123867#M3612</link>
      <description>&lt;P&gt;For reference, the Dropbox API does have a rate limiting system, but it is per-user, so you don't need to worry about a single user getting your entire app (and other users) rate limited. &lt;/P&gt;

&lt;P&gt;And yes, it is normal and acceptable that desktop apps will handle the user's access token locally.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 03:23:08 GMT</pubDate>
      <guid>https://www.dropboxforum.com/t5/Dropbox-API-Support-Feedback/How-to-make-sure-clients-dont-misuse-access-tokens-provided-to/m-p/123867#M3612</guid>
      <dc:creator>Greg-DB</dc:creator>
      <dc:date>2015-02-18T03:23:08Z</dc:date>
    </item>
  </channel>
</rss>

