© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. BakerSecure Web Application Development https://doi.org/10.1007/978-1-4842-8596-1_11

11. OAuth2

Matthew Baker1  
(1)
Kaisten, Aargau, Switzerland
 

In the last chapter, we looked at authentication and authorization. A widely used authorization protocol is OAuth2. It is a large topic with many use cases and options, so we have given it its own chapter.

OAuth2 is defined in RFC 6749 [10]. It delegates the roles of a client and authorization provider. In this way, authentication can be performed exclusively by the service where the user is registered, without having to share the user’s credentials.

As an example, imagine we want users of our Coffeeshop to be able ...

Get Secure Web Application Development: A Hands-On Guide with Python and Django now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.