dcsimg
September 19, 2018
Hot Topics:

OAuth: Token-Based Authorization for the Social Networking Age

  • March 4, 2010
  • By Jaswinder Singh
  • Send Email »
  • More Articles »

In an age when web users have their social data scattered across different social sites and they want to access and use this data from outside these sites, developers face the serious security challenge of enabling users to access their private data in social sites without having to share their credentials.OAuth is the perfect solution. This open authorization protocol that allows standard and secure API authorization without exposing the user's credentials. OAuth also provides a mechanism to grant limited access (in scope, duration, and so on).

In his Web Developer's Virtual Library (WDVL) article, Jaswinder Singh provides an overview of OAuth's token-based authorization system and explains how this system works between two web sites. At a high level, the elements involved are:

  • User: Social network (Orkut, Facebook, Twitter, iGoogle, etc.) users like you and me
  • OAuth Provider: Web site or social networking site where the user's private resources are stored
  • OAuth Consumer: Web site, social networking site, mobile device, set-top box, etc. trying to access the protected resource on the other site

Read the full story at Web Developer's Virtual Library:
OAuth: Token-Based Authorization for the Social Networking Age






Comment and Contribute

 


(Maximum characters: 1200). You have characters left.

 

 


Enterprise Development Update

Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that developer.com may send you developer offers via email, phone and text message, as well as email offers about other products and services that developer believes may be of interest to you. developer will process your information in accordance with the Quinstreet Privacy Policy.

Sitemap

Thanks for your registration, follow us on our social networks to keep up-to-date