Summary

In this chapter, we have taken a dedicated look at special considerations for integrating with OAuth 2.0 service providers via native mobile applications. We explored the appropriate flow to use from native mobile applications, as well as alternatives that make use of certain platforms' capabilities. There are very important, but subtle, security implications that are important for developers to be aware of. We then discussed how to leverage both workflows in a hybrid architecture to maximize performance and security. Finally, we looked at special provisions that are allowed to mobile application developers integrating with certain major service providers. In the next chapter, we will look at how to troubleshoot your OAuth 2.0 application ...

Get Mastering OAuth 2.0 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.