By
G J Kartheek
   Steps:

      1. Sending the request using Oauth_id of the application to facebook

      2. Sending the permission(parameter,scope) required to access and account

      3. Getting the access_token,access_verfier from the server(facebook)

      4. Storing it in out database to reuse the token

      5. Using the token we “Get” /”Post” the status or any information of the user

      6. We store the fbuserid(pageId) of the particular user/page so as to identify
        the user/page

      7. In return if we “POST” of any status or message we get an id which is the
        id of the POST or message we store that in the database so as to reuse the
        information of the post
   It was introduced in 2006

   Make User grant access to the private resources of the one
    website(service provider) to another website (the consumer)

   OAuth attempts to provide a standard way for developers to offer their
    services via an API without forcing their users to expose their passwords
1.   Token: Unique Identifier issued by server

2.   CallBack Uri: Url to which the page is redirected after authentication or
     Authorization

3.   Oauth_token : Temporary credentials identifier

4.   Oauth_token_secret : Temporary Credentials shared secret

5.   Oauth_verifier: The verification code received from the server in the
     previous step.

6.   Oauth_callback_confirmed: It must be present and set value true. This
     parameter is used to differentiate from previous versions of protocol

7.   http/1.1 XXX: STATUS
                      1.   200 : Status Ok – Success

                      2.   403 : Status Not Ok – Un Authorized

                      3.   400: Status Not Ok – Bad Request
OAuth Linking-Social Networks
   The OAuth 1.0 Protocol – by E. Hammer-Lahav, Ed. ISSN: 2070-1721

   Oauth community Site - http://oauth.net/

   book can be downloaded at - http://tools.ietf.org/html/rfc5849

   Oauth core information site - http://oauth.net/core/1.0/

More Related Content

PPTX
"Протокол авторизации OAuth"
PPTX
Id fiware upm-dit
PPTX
OAuth2 Introduction
PPTX
Open id & OAuth
PPTX
Api security with o auth2
PPT
Silicon Valley Code Camp 2009: OAuth: What, Why and How
PDF
Facebook Login & Open Graph Introduction
ODP
3rd-Party Authn/Authz
"Протокол авторизации OAuth"
Id fiware upm-dit
OAuth2 Introduction
Open id & OAuth
Api security with o auth2
Silicon Valley Code Camp 2009: OAuth: What, Why and How
Facebook Login & Open Graph Introduction
3rd-Party Authn/Authz

Similar to OAuth Linking-Social Networks (20)

PPTX
Oauth2 and OWSM OAuth2 support
PDF
Stateless Auth using OAuth2 & JWT
PDF
Stateless Auth using OAUTH2 & JWT
PPTX
Api security
PPTX
Introduction to OAuth2
PDF
Data Synchronization Patterns in Mobile Application Design
PDF
Keeping Pace with OAuth’s Evolving Security Practices.pdf
PPTX
Securing your APIs with OAuth, OpenID, and OpenID Connect
PDF
SAML VS OAuth 2.0 VS OpenID Connect
PPTX
Maintest 100713212237-phpapp02-100714080303-phpapp02
PPTX
Maintest 100713212237-phpapp02-100714080303-phpapp02
PPTX
Intro to OAuth2 and OpenID Connect
PPTX
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
PPTX
CIS 2012 - Going Mobile with PingFederate and OAuth 2
PPTX
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
PDF
FIWARE ID Management
KEY
LinkedIn OAuth: Zero To Hero
PPTX
MainFinalOAuth
Oauth2 and OWSM OAuth2 support
Stateless Auth using OAuth2 & JWT
Stateless Auth using OAUTH2 & JWT
Api security
Introduction to OAuth2
Data Synchronization Patterns in Mobile Application Design
Keeping Pace with OAuth’s Evolving Security Practices.pdf
Securing your APIs with OAuth, OpenID, and OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
Maintest 100713212237-phpapp02-100714080303-phpapp02
Maintest 100713212237-phpapp02-100714080303-phpapp02
Intro to OAuth2 and OpenID Connect
OAuth 2.0 - The fundamentals, the good , the bad, technical primer and commo...
CIS 2012 - Going Mobile with PingFederate and OAuth 2
Microservice security with spring security 5.1,Oauth 2.0 and open id connect
FIWARE ID Management
LinkedIn OAuth: Zero To Hero
MainFinalOAuth
Ad

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Modernising the Digital Integration Hub
PPT
Geologic Time for studying geology for geologist
PPTX
Configure Apache Mutual Authentication
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
The various Industrial Revolutions .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
DOCX
search engine optimization ppt fir known well about this
Architecture types and enterprise applications.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Modernising the Digital Integration Hub
Geologic Time for studying geology for geologist
Configure Apache Mutual Authentication
Module 1.ppt Iot fundamentals and Architecture
A proposed approach for plagiarism detection in Myanmar Unicode text
Getting started with AI Agents and Multi-Agent Systems
Microsoft Excel 365/2024 Beginner's training
A contest of sentiment analysis: k-nearest neighbor versus neural network
The influence of sentiment analysis in enhancing early warning system model f...
Benefits of Physical activity for teenagers.pptx
Developing a website for English-speaking practice to English as a foreign la...
sbt 2.0: go big (Scala Days 2025 edition)
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
UiPath Agentic Automation session 1: RPA to Agents
The various Industrial Revolutions .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
search engine optimization ppt fir known well about this
Ad

OAuth Linking-Social Networks

  • 2. Steps: 1. Sending the request using Oauth_id of the application to facebook 2. Sending the permission(parameter,scope) required to access and account 3. Getting the access_token,access_verfier from the server(facebook) 4. Storing it in out database to reuse the token 5. Using the token we “Get” /”Post” the status or any information of the user 6. We store the fbuserid(pageId) of the particular user/page so as to identify the user/page 7. In return if we “POST” of any status or message we get an id which is the id of the POST or message we store that in the database so as to reuse the information of the post
  • 3. It was introduced in 2006  Make User grant access to the private resources of the one website(service provider) to another website (the consumer)  OAuth attempts to provide a standard way for developers to offer their services via an API without forcing their users to expose their passwords
  • 4. 1. Token: Unique Identifier issued by server 2. CallBack Uri: Url to which the page is redirected after authentication or Authorization 3. Oauth_token : Temporary credentials identifier 4. Oauth_token_secret : Temporary Credentials shared secret 5. Oauth_verifier: The verification code received from the server in the previous step. 6. Oauth_callback_confirmed: It must be present and set value true. This parameter is used to differentiate from previous versions of protocol 7. http/1.1 XXX: STATUS 1. 200 : Status Ok – Success 2. 403 : Status Not Ok – Un Authorized 3. 400: Status Not Ok – Bad Request
  • 6. The OAuth 1.0 Protocol – by E. Hammer-Lahav, Ed. ISSN: 2070-1721  Oauth community Site - http://oauth.net/  book can be downloaded at - http://tools.ietf.org/html/rfc5849  Oauth core information site - http://oauth.net/core/1.0/