SlideShare a Scribd company logo
OAuth 2.0
codesnippet.in
Introduction
 The OAuth 2.0 authorization framework enables a third-party
application to obtain limited access to an HTTP service, either on
behalf of a resource owner by orchestrating an approval interaction
between the resource owner and the HTTP service, or by allowing the
third-party application to obtain access on its own behalf.
 OAuth addresses issue of sharing resource owner’s credentials to
access protected resources by introducing an authorization layer and
separating the role of the client from that of the resource owner.
 In OAuth, the client requests access to resources controlled by the
resource owner and hosted by the resource server, and is issued a
different set of credentials than those of the resource owner.
 The client obtains an access token -- a string denoting a specific
scope, lifetime, and other access attributes. Access tokens are issued
to third-party clients by an authorization server with the approval of
the resource owner. The client uses the access token to access the
protected resources hosted by the resource server.
Terminology
 Access token - A token used to access protected resources.
 Authorization code - An intermediary token generated when a user
authorizes a client to access protected resources on their behalf.The client
receives this token and exchanges it for an access token.
 Authorization server - A server which issues access tokens after successfully
authenticating a client and resource owner, and authorizing the request.
 Client - An application which accesses protected resources on behalf of the
resource owner (such as a user).The client could be hosted on a server,
desktop, mobile or other device. Client Id and Client secret
 Grant - A grant is a method of acquiring an access token.
 Resource server - A server which sits in front of protected resources (for
example “tweets”, users’ photos, or personal data) and is capable of accepting
and responding to protected resource requests using access tokens.
 Resource owner -The user who authorizes an application to access their
account.The application’s access to the user’s account is limited to the
“scope” of the authorization granted (e.g. read or write access).
 Scope - A permission.
Grant flow
Client
Credentials
Grant
token_type
expires_in
access_token
grant_type |
client_id |
client_secret | scope
Authorization
Grant
response_type|
client_id | redirect_uri
| scope | state
code
| state
grant_type |
client_id |
client_secret |
redirect_uri | code
token_type |
expires_in |
access_token |
refresh_token
Password
Grant
grant_type|
client_id |
client_secret | scope |
username |password
token_type
| expires_in |
access_token |
refresh_token
ImplicitGrant
response_type|
client_id |
redirect_uri |
scope | state
token_type
| expires_in |
access_token | state
O auth

More Related Content

PPTX
Introduction to OAuth2
DOCX
Existing system
PPTX
Apache Airavata Credential Store
PPTX
OAuth2 Presentaion
PDF
Spring security oauth2
PPT
Grid security
PPT
Mashing Up with User-centric Identity
PPTX
Iam sso-questioner
Introduction to OAuth2
Existing system
Apache Airavata Credential Store
OAuth2 Presentaion
Spring security oauth2
Grid security
Mashing Up with User-centric Identity
Iam sso-questioner

Similar to O auth (20)

PDF
A Survey on SSO Authentication protocols: Security and Performance
PPTX
OAuth2 Implementation Presentation (Java)
PPTX
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
PDF
Introduction to OAuth2.0
PPTX
An introduction to OAuth 2
PPTX
Oauth2 and OWSM OAuth2 support
PPTX
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
PDF
OAuth 2.0 with IBM WebSphere DataPower
PPT
O auth 2
PDF
Lecture #25 : Oauth 2.0
PPTX
OAuth2 + API Security
PPTX
O auth 2.0 authorization framework
PDF
OAuth2 primer
PDF
OAuth2
PPTX
OAuth [noddyCha]
PPTX
The OAuth 2.0 Authorization Framework
PPT
Silicon Valley Code Camp 2009: OAuth: What, Why and How
PDF
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
PPTX
"Протокол авторизации OAuth"
PDF
OAuth 2.0 with Pet Care House
A Survey on SSO Authentication protocols: Security and Performance
OAuth2 Implementation Presentation (Java)
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
Introduction to OAuth2.0
An introduction to OAuth 2
Oauth2 and OWSM OAuth2 support
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
OAuth 2.0 with IBM WebSphere DataPower
O auth 2
Lecture #25 : Oauth 2.0
OAuth2 + API Security
O auth 2.0 authorization framework
OAuth2 primer
OAuth2
OAuth [noddyCha]
The OAuth 2.0 Authorization Framework
Silicon Valley Code Camp 2009: OAuth: What, Why and How
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
"Протокол авторизации OAuth"
OAuth 2.0 with Pet Care House
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
top salesforce developer skills in 2025.pdf
PDF
Understanding Forklifts - TECH EHS Solution
PDF
medical staffing services at VALiNTRY
PPTX
Introduction to Artificial Intelligence
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
history of c programming in notes for students .pptx
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
AI in Product Development-omnex systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41
How Creative Agencies Leverage Project Management Software.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
CHAPTER 2 - PM Management and IT Context
Navsoft: AI-Powered Business Solutions & Custom Software Development
How to Choose the Right IT Partner for Your Business in Malaysia
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
ManageIQ - Sprint 268 Review - Slide Deck
VVF-Customer-Presentation2025-Ver1.9.pptx
2025 Textile ERP Trends: SAP, Odoo & Oracle
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
top salesforce developer skills in 2025.pdf
Understanding Forklifts - TECH EHS Solution
medical staffing services at VALiNTRY
Introduction to Artificial Intelligence
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
history of c programming in notes for students .pptx
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PTS Company Brochure 2025 (1).pdf.......
AI in Product Development-omnex systems
Ad

O auth

  • 2. Introduction  The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  OAuth addresses issue of sharing resource owner’s credentials to access protected resources by introducing an authorization layer and separating the role of the client from that of the resource owner.  In OAuth, the client requests access to resources controlled by the resource owner and hosted by the resource server, and is issued a different set of credentials than those of the resource owner.  The client obtains an access token -- a string denoting a specific scope, lifetime, and other access attributes. Access tokens are issued to third-party clients by an authorization server with the approval of the resource owner. The client uses the access token to access the protected resources hosted by the resource server.
  • 3. Terminology  Access token - A token used to access protected resources.  Authorization code - An intermediary token generated when a user authorizes a client to access protected resources on their behalf.The client receives this token and exchanges it for an access token.  Authorization server - A server which issues access tokens after successfully authenticating a client and resource owner, and authorizing the request.  Client - An application which accesses protected resources on behalf of the resource owner (such as a user).The client could be hosted on a server, desktop, mobile or other device. Client Id and Client secret  Grant - A grant is a method of acquiring an access token.  Resource server - A server which sits in front of protected resources (for example “tweets”, users’ photos, or personal data) and is capable of accepting and responding to protected resource requests using access tokens.  Resource owner -The user who authorizes an application to access their account.The application’s access to the user’s account is limited to the “scope” of the authorization granted (e.g. read or write access).  Scope - A permission.
  • 6. Authorization Grant response_type| client_id | redirect_uri | scope | state code | state grant_type | client_id | client_secret | redirect_uri | code token_type | expires_in | access_token | refresh_token
  • 7. Password Grant grant_type| client_id | client_secret | scope | username |password token_type | expires_in | access_token | refresh_token
  • 8. ImplicitGrant response_type| client_id | redirect_uri | scope | state token_type | expires_in | access_token | state