- Mastering OAuth 2.0
- Charles Bihis
- 181字
- 2021-07-30 10:05:13
Summary
In this chapter, we took a deeper look at the inner workings of the OAuth 2.0 protocol in order to see how the concepts of federated identity and delegated authority are achieved. We introduced user consent and gave an example of where you may have already seen such a process. We also discussed the concept of trust and how it relates to client applications and the workflows they use. In particular, we explored the client-side flow for untrusted clients and the server-side flow for trusted clients. This all culminates in the ability to determine the trust level for a client application, and subsequently, the ability to choose an appropriate workflow for the application to enable the exchange of information in as secure a manner as possible.
In the next chapter, we will look at the overall workflow from a developer's perspective. There are really only four simple steps to explore. This will give us a straightforward template that we can use when we start creating our own application, The World's Most Interesting Infographic Generator, in Chapter 4, Register Your Application.
- ASP.NET Web API:Build RESTful web applications and services on the .NET framework
- Advanced Machine Learning with Python
- 零基礎PHP學習筆記
- Blockly創意趣味編程
- Visual C++串口通信技術詳解(第2版)
- HTML5+CSS3+JavaScript Web開發案例教程(在線實訓版)
- Python完全自學教程
- 大模型RAG實戰:RAG原理、應用與系統構建
- 精通MATLAB(第3版)
- SQL經典實例(第2版)
- Python 3 Object:oriented Programming(Second Edition)
- 大數據時代的企業升級之道(全3冊)
- 零基礎學SQL(升級版)
- Python算法交易實戰
- Activiti權威指南