官术网_书友最值得收藏!

  • Mastering OAuth 2.0
  • Charles Bihis
  • 181字
  • 2021-07-30 10:05:13

Summary

In this chapter, we took a deeper look at the inner workings of the OAuth 2.0 protocol in order to see how the concepts of federated identity and delegated authority are achieved. We introduced user consent and gave an example of where you may have already seen such a process. We also discussed the concept of trust and how it relates to client applications and the workflows they use. In particular, we explored the client-side flow for untrusted clients and the server-side flow for trusted clients. This all culminates in the ability to determine the trust level for a client application, and subsequently, the ability to choose an appropriate workflow for the application to enable the exchange of information in as secure a manner as possible.

In the next chapter, we will look at the overall workflow from a developer's perspective. There are really only four simple steps to explore. This will give us a straightforward template that we can use when we start creating our own application, The World's Most Interesting Infographic Generator, in Chapter 4, Register Your Application.

主站蜘蛛池模板: 丰城市| 深泽县| 昌平区| 辉南县| 郁南县| 伊川县| 南陵县| 井研县| 大田县| 岢岚县| 通道| 高台县| 饶平县| 调兵山市| 惠水县| 调兵山市| 内江市| 班玛县| 宁波市| 大姚县| 延吉市| 峨山| 县级市| 易门县| 安多县| 墨江| 邢台市| 宝丰县| 仙桃市| 中江县| 婺源县| 涞水县| 灵武市| 荔浦县| 龙岩市| 隆尧县| 枝江市| 上饶县| 颍上县| 偏关县| 马边|