In the last chapter, we looked at authentication and authorization. A widely used authorization protocol is OAuth2. It is a large topic with many use cases and options, so we have given it its own chapter.
OAuth2 is defined in RFC 6749 [10]. It delegates the roles of a client and authorization provider. In this way, authentication can be performed exclusively by the service where the user is registered, without having to share the user’s credentials.
As an example, imagine we want users of our Coffeeshop to be able ...