官术网_书友最值得收藏!

  • Mastering OAuth 2.0
  • Charles Bihis
  • 181字
  • 2021-07-30 10:05:13

Summary

In this chapter, we took a deeper look at the inner workings of the OAuth 2.0 protocol in order to see how the concepts of federated identity and delegated authority are achieved. We introduced user consent and gave an example of where you may have already seen such a process. We also discussed the concept of trust and how it relates to client applications and the workflows they use. In particular, we explored the client-side flow for untrusted clients and the server-side flow for trusted clients. This all culminates in the ability to determine the trust level for a client application, and subsequently, the ability to choose an appropriate workflow for the application to enable the exchange of information in as secure a manner as possible.

In the next chapter, we will look at the overall workflow from a developer's perspective. There are really only four simple steps to explore. This will give us a straightforward template that we can use when we start creating our own application, The World's Most Interesting Infographic Generator, in Chapter 4, Register Your Application.

主站蜘蛛池模板: 浑源县| 莱阳市| 汝州市| 西丰县| 酒泉市| 新平| 堆龙德庆县| 申扎县| 十堰市| 新建县| 米林县| 新民市| 三门县| 梓潼县| 千阳县| 黑龙江省| 河池市| 三都| 平谷区| 将乐县| 色达县| 汾阳市| 和平县| 玛纳斯县| 北宁市| 山东省| 江津市| 耒阳市| 绿春县| 施秉县| 日照市| 会昌县| 公主岭市| 建平县| 陵川县| 磐石市| 北辰区| 聂拉木县| 扶绥县| 天峨县| 南充市|