O'Reilly logo

OAuth 2.0 Identity and Access Management Patterns by Martin Spasovski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. First Step for Your Application

This chapter will help us to take the necessary steps that are common when developing a client application.

As mentioned, client applications can be web, mobile, desktop, or any other type, and use OAuth 2.0 for making requests to protected resources (files, data, or other services that an API may provide) on a given service provider, on behalf of the resource owner, most commonly the user.

OAuth 2.0 has significantly improved from OAuth 1.0 regarding this area—the focus of all the different types of applications and defining authorization flows for them.

Client registration

When developing an application that makes requests to protected resources on some service provider, and if this service uses OAuth 2.0 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required