This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "File:20151215-Top X OAuth 2 Hacks-asanso.pdf"

From OWASP
Jump to: navigation, search
(The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and...)
 
(No difference)

Latest revision as of 02:16, 15 January 2016

The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and more sites rely on distributed services and cloud computing or a third-party application utilizing APIs from multiple services. OAuth 2 is widely used from major internet players (as Google, Facebook, Twitter) in order to secure their (also REST) APIs. This talk will introduce the OAuth 2 framework and it will show security pitfalls and common implementation mistakes.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current02:16, 15 January 2016 (9.46 MB)Schattenbaum (talk | contribs)The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and...
  • You cannot overwrite this file.

There are no pages that link to this file.