As you can see it is a login with twitch, it takes my clientID and redirect to that url after the login.
When I am on the twitch login page, on the top I can see the CliendID in the URL.
Is this correct or it is a lack of security?
If it is, how can I hide the ClientID?
If it is something public or not problematic to share, let me know.
Thanks for the help
So, the end user actually see HIS oauth, but it’s good right? Since it is his oaught and I use it to know the info that he allowed me to see.
Or there is a way to hide this content when he gets back to http://localhost:4200?
As Barry said, with the implicit flow that is intentional and because of the nature of that has drawbacks and limitations, such as no ability to refresh the token (meaning you have to get the user to go through the auth process each time the token expires), and a shorter expiration.
If you use the Authorization Code flow, rather than getting redirected and having the token in the querystring param, you have a code instead which your server can exchange for an access token (and only your server can do this as it requires your client secret which the end user should never know). This also has the advantage of giving you a refresh token so that if the token expires you can refresh it without user interaction.