Changes

Jump to: navigation, search

Privacy/BestPractices/OAuth

6 bytes added, 21:48, 23 May 2011
Overview of OAuth
It is often important for users to give a third party access to their data. OAuth is a widely deployed standard for this purpose: a data host, e.g. Facebook, allows a consumer, e.g. FarmVille, to access a user's data when that user agrees. The OAuth protocol consists of two major portions:
* credential negotiation: the consumer, data host, and user engage in a dance that concludes in with the consumer obtaining credentials that will allow it to make API calls into the data host to access the user's data. In this process, the user typically sees, before approving the request, which rights the data consumer is requesting (e.g. read, read/write, ...).
* authenticating API calls: the consumer uses credentials to authenticate its API calls against the data host.
Though they both follow the above pattern, OAuth version 1 .0 and 2 .0 are quite different, but they both follow the above pattern.
=== Differences between OAuth 1.0 and 2.0 ===
668
edits

Navigation menu