File:20151215-Top X OAuth 2 Hacks-asanso.pdf

From OWASP
Jump to: navigation, search
20151215-Top_X_OAuth_2_Hacks-asanso.pdf(file size: 9.46 MB, MIME type: application/pdf)

The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and more sites rely on distributed services and cloud computing or a third-party application utilizing APIs from multiple services. OAuth 2 is widely used from major internet players (as Google, Facebook, Twitter) in order to secure their (also REST) APIs. This talk will introduce the OAuth 2 framework and it will show security pitfalls and common implementation mistakes.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current03:16, 15 January 2016 (9.46 MB)Schattenbaum (talk | contribs)The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and...
  • You cannot overwrite this file.

There are no pages that link to this file.