O'Reilly logo

Programming Social Applications by Jonathan LeBlanc

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Beyond Basic Auth

To start our exploration of OAuth, we’ll first look into what basic authentication (basic auth, for short) is and how OAuth presents a more mature iteration of it. You may have seen basic auth being used by many companies, and you may have even worked with it before; if you have, you understand how easy it is to implement. But “easy” by no means implies “secure,” and it certainly doesn’t mean that basic auth should be employed just to increase the speed at which resources are returned.

Let’s explore some basic auth fundamentals as well as a few of the potential pitfalls of using it, implementing it in an application, or providing it.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required