O'Reilly logo

Programming Social Applications by Jonathan LeBlanc

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Conclusion

Now that we’ve concluded our exploration of OpenID, OAuth, and the hybrid auth extension, we can clearly see how combining specifications delivers both the rich capabilities of an authentication sign-in model and the extensive amount of data and viral channels that are available through the authorization standards.

In this chapter, we have identified the questions you should ask yourself before implementing the hybrid auth extension and delved into practical implementation examples to see how these two standards are combined.

We have now experienced firsthand the extensive capabilities that are available in both specifications, and discovered the potential they offer us for creating efficient and powerful login and personalization systems.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required