Since mobile apps and spa cannot keep client secret confidential in the implicit flow the access token is directly issued by authorization endpoint (instead of issuing authorization code which is more secure) . Note that implcit flow is now deprecated and for native apps and spa, authorization code flow with PKCE (Proof key for code exchange) is is the recommended OAuth flow.

Implicit flow diagram

 

Implicit flow in case of spa (with/without backend)

Implicit flow in native app (not recommended)

While implicit flow could be intiated with external user agent (browser) it is not recommended as risk of  token interception attack is there , as there is no reliable way to ensure that the binding between a given redirect URI and a specific mobile application is honored. Any app on the device can try to insert itself into the redirection process and cause it to serve the redirect URI. Hence the attacker can steal the access token. ie the token can be intercepted by malicious application. For this reason for native apps, authorization code flow with pkce is recommended.

Note that however direction of authorization end point in case of native apps is a top level navigation request to authorization end point and the cookie set in response will be a first party cookie. 

Implicit flow in web app 

Implicit flow with response_mode=form_post in case of webapp does not have issue of tokens getting exposed in browser history and does not have thirdy party cookie issues (A redirect to authorization end point will be a top level navigation by user and auth cookie will be set in response to top level navigation ) yet it should be used only in authentication use case and not authentication plus authorization use case because of usability issues.