This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "File:20151215-Top X OAuth 2 Hacks-asanso.pdf"
Schattenbaum (talk | contribs) (The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and...) |
(No difference)
|
Latest revision as of 08:16, 15 January 2016
The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and more sites rely on distributed services and cloud computing or a third-party application utilizing APIs from multiple services. OAuth 2 is widely used from major internet players (as Google, Facebook, Twitter) in order to secure their (also REST) APIs. This talk will introduce the OAuth 2 framework and it will show security pitfalls and common implementation mistakes.
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Dimensions | User | Comment | |
---|---|---|---|---|
current | 08:16, 15 January 2016 | (9.46 MB) | Schattenbaum (talk | contribs) | The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and... |
- You cannot overwrite this file.
File usage
There are no pages that link to this file.