The largest Interview Solution Library on the web


« Previous | 1 | 2 | 3 | Next »

Oauth_2.0 - References


While the specifications formed the basis for the description and diagrams of the individual protocol flows, a number of other online resources were used in preparation of this book.

Specifications
  • OAuth 2.0 draft
  • OAuth 2.0 threat model and security considerations
  • OAuth 2.0: Bearer tokens
  • OAuth 2.0: MAC access authentication
  • OpenID Connect Basic, Standard and Messages
  • JSON Web Token (JWT)
  • OAuth 2.0: Token revocation
Vendor Documentation
  • Facebook Authentication
  • Facebook Graph API
  • Digging Deeper into OAuth 2.0 on Force.com
  • Authenticating Remote Access with Salesforce
  • Google OAuth 2.0
  • Google’s Internet Identity Research
  • Google’s OAuth 2.0 Controllers for iOS
  • OAuth 2.0 on Android
  • OAuth 2.0 on Android with Google Tasks
  • Windows Live SDK—OAuth 2.0
Mailing Lists
  • OAuth IETF Working Group
  • OpenID Connect Working Group
  • Google’s oauth2-dev forum for questions about their OAuth 2.0 implementation
Misc
  • Google Code blog—OAuth 2.0 changes
  • hueniverse blog—OAuth 2.0 (Without Signatures) Is Bad for the Web
  • OAuth 2.0 flow diagrams
« Previous | 1 | 2 | 3 | Next »


copyright © 2014 - all rights riserved by javatechnologycenter.com