官术网_书友最值得收藏!

  • Mastering OAuth 2.0
  • Charles Bihis
  • 181字
  • 2021-07-30 10:05:13

Summary

In this chapter, we took a deeper look at the inner workings of the OAuth 2.0 protocol in order to see how the concepts of federated identity and delegated authority are achieved. We introduced user consent and gave an example of where you may have already seen such a process. We also discussed the concept of trust and how it relates to client applications and the workflows they use. In particular, we explored the client-side flow for untrusted clients and the server-side flow for trusted clients. This all culminates in the ability to determine the trust level for a client application, and subsequently, the ability to choose an appropriate workflow for the application to enable the exchange of information in as secure a manner as possible.

In the next chapter, we will look at the overall workflow from a developer's perspective. There are really only four simple steps to explore. This will give us a straightforward template that we can use when we start creating our own application, The World's Most Interesting Infographic Generator, in Chapter 4, Register Your Application.

主站蜘蛛池模板: 岳西县| 垣曲县| 德保县| 威信县| 周至县| 西峡县| 全椒县| 珠海市| 玉屏| 瑞昌市| 汨罗市| 昌平区| 洞口县| 邢台县| 瑞金市| 遂溪县| 班玛县| 石狮市| 湾仔区| 沾化县| 邢台市| 镇康县| 郁南县| 渭源县| 麻栗坡县| 孙吴县| 松原市| 牡丹江市| 酉阳| 乌鲁木齐县| 清涧县| 抚州市| 南京市| 无锡市| 烟台市| 竹溪县| 梅州市| 宣化县| 师宗县| 卓尼县| 方正县|