OTS authenticates with Google via OAuth 2.0 and OpenID Connect
This is a static, self-contained demo for educational purposes. It does not connect to any live systems and is not intended as a reference implementation.
User navigates to the OTS dashboard or clicks 'Sign in with Google'. OTS checks for a valid session and finds none, so it generates PKCE parameters (code_verifier + code_challenge), a random state for CSRF protection, and a nonce for token replay prevention, then redirects to Google's authorization endpoint.
PKCE (Proof Key for Code Exchange, RFC 7636) protects against authorization code interception attacks. OTS generates a random code_verifier (43-128 chars), computes code_challenge = BASE64URL(SHA256(code_verifier)), and sends only the challenge to Google. The verifier is stored server-side and sent during token exchange. The state parameter prevents CSRF; the nonce prevents ID token replay.