668
edits
No edit summary |
|||
| Line 11: | Line 11: | ||
Let's dig into these two processes a bit assuming the default use-case of one web service requesting access to another. | Let's dig into these two processes a bit assuming the default use-case of one web service requesting access to another. | ||
=== | === Credential Negotiation === | ||
* the consumer registers with the data host and obtains a <tt>consumer_key</tt>, which is considered public, and a <tt>consumer_secret</tt>, which should be kept private. | * the consumer registers with the data host and obtains a <tt>consumer_key</tt>, which is considered public, and a <tt>consumer_secret</tt>, which should be kept private. | ||
edits