Global Information Lookup Global Information

OAuth information


Unofficial logo designed by Chris Messina
Latest version2.0
OrganizationInternet Engineering Task Force
Website"The OAuth 2.0 Authorization Framework".

OAuth (short for "Open Authorization"[1][2]) is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on other websites but without giving them the passwords.[3][4] This mechanism is used by companies such as Amazon,[5] Google, Meta Platforms, Microsoft, and Twitter to permit users to share information about their accounts with third-party applications or websites.

Generally, the OAuth protocol provides a way for resource owners to provide a client [application] with secure delegated access to server resources. It specifies a process for resource owners to authorize third-party access to their server resources without providing credentials. Designed specifically to work with Hypertext Transfer Protocol (HTTP), OAuth essentially allows access tokens to be issued to third-party clients by an authorization server, with the approval of the resource owner. The third party then uses the access token to access the protected resources hosted by the resource server.[2]

  1. ^ "Open Authorization - Glossary | CSRC". csrc.nist.gov.
  2. ^ a b Hardt, Dick (October 2012). Hardt, D (ed.). "RFC6749 - The OAuth 2.0 Authorization Framework". Internet Engineering Task Force. doi:10.17487/RFC6749. Archived from the original on 15 October 2012. Retrieved 10 October 2012. {{cite journal}}: Cite journal requires |journal= (help)
  3. ^ Whitson, Gordon. "Understanding OAuth: What Happens When You Log Into a Site with Google, Twitter, or Facebook". Lifehacker. Archived from the original on 24 April 2014. Retrieved 15 May 2016.
  4. ^ Henry, Gavin (January 2020). "Justin Richer on OAuth". IEEE Software. 37 (1): 98–100. doi:10.1109/MS.2019.2949648. ISSN 0740-7459.
  5. ^ "Amazon & OAuth 2.0". Archived from the original on 8 December 2017. Retrieved 15 December 2017.

and 21 Related for: OAuth information

Request time (Page generated in 0.5474 seconds.)

OAuth

Last Update:

OAuth (short for "Open Authorization") is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications...

Word Count : 2738

List of OAuth providers

Last Update:

List of notable OAuth service providers. List of single sign-on implementations Hotmail, Windows Live, Messenger, Entra ID (formally Azure Active Directory)...

Word Count : 541

OpenID

Last Update:

while OAuth facilitates the authorization of one site to access and use information related to the user's account on another site. Although OAuth is not...

Word Count : 6029

Token Binding

Last Update:

deployment of HTTPS Token Binding. Related IETF draft standard: OAuth 2.0 Token Binding. Enables OAuth 2.0 implementations to apply Token Binding to Access Tokens...

Word Count : 1029

Heroku

Last Update:

used for automation purposes. Heroku confirmed that the attack accessed OAuth bearer tokens used for integration with GitHub and salted and hashed customer...

Word Count : 1187

Keycloak

Last Update:

build of Keycloak. Keycloak supports various protocols such as OpenID, OAuth version 2.0 and SAML and provides features such as user management, two-factor...

Word Count : 530

JSON Web Token

Last Update:

it to a OAuth compliant service like so: POST /oauth2/token Content-type: application/x-www-form-urlencoded grant_type=urn:ietf:params:oauth...

Word Count : 1479

Identity provider

Last Update:

an identity layer on top of OAuth. In the domain model associated with OIDC, an identity provider is a special type of OAuth 2.0 authorization server. Specifically...

Word Count : 401

Live Connect

Last Update:

at any time. Live Connect is built on standard web technologies such as OAuth 2.0, Representational State Transfer (REST), and JavaScript Object Notation...

Word Count : 441

Google Play Services

Last Update:

When it was introduced in 2012, it provided access to the Google+ APIs and OAuth 2.0. It expanded to cover a variety of Google services, allowing applications...

Word Count : 1145

Twitter

Last Update:

developer community. In 2010, Twitter mandated that all developers adopt OAuth authentication with just 9 weeks of notice. Later that year, Twitter launched...

Word Count : 29411

Google APIs

Last Update:

the APIs requires authentication and authorization using the Oauth 2.0 protocol. Oauth 2.0 is a simple protocol. To start, it is necessary to obtain...

Word Count : 699

XRDS

Last Update:

subsequently became part of OpenID Authentication 2.0. In early 2008, work on OAuth discovery by Eran Hammer-Lahav led to the development of XRDS Simple, a...

Word Count : 966

XACML

Last Update:

policies. OAuth 2.0 is considered to be an authorization standard. It differs from XACML though in its origin, its purpose, and its applications. OAuth is about:...

Word Count : 5191

Simple Authentication and Security Layer

Last Update:

by Microsoft for MSN Chat OAUTHBEARER OAuth 2.0 bearer tokens (RFC 6750), communicated through TLS OAUTH10A OAuth 1.0a message-authentication-code tokens...

Word Count : 694

SMTP Authentication

Last Update:

authentication) MD5 CRAM-MD5 OAUTH10A (OAuth 1.0a HMAC-SHA1 tokens as defined in RFC 5849) OAUTHBEARER (OAuth 2.0 bearer tokens as defined in RFC 6750)...

Word Count : 1229

BigQuery

Last Update:

authenticated, supporting a number of Google-proprietary mechanisms as well as OAuth. Managing data - Create and delete objects such as tables, views, and user...

Word Count : 626

Comparison of Internet forum software

Last Update:

accessibility of the application. This can be accomplished with standards like OAuth and OpenID. To prevent loss of content from browser crashes and the like...

Word Count : 2870

Web API security

Last Update:

authentication service. User-delegated tokens: These are tokens such as OAuth which are granted based on user authentication. Policy & attribute-based...

Word Count : 698

Web development

Last Update:

and authorization: Implementing robust authentication mechanisms, such as OAuth or JSON Web Tokens (JWT), ensures that only authorized users can access...

Word Count : 4681

FileMaker

Last Update:

scalability up to 500 concurrent users, PDF generation on server and WebDirect, OAuth 2.0 support (Amazon, Google, Microsoft) at the Security layer FileMaker...

Word Count : 2339

PDF Search Engine © AllGlobal.net