This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:20151215-Top X OAuth 2 Hacks-asanso.pdf

From OWASP
Revision as of 02:16, 15 January 2016 by Schattenbaum (talk | contribs) (The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
20151215-Top_X_OAuth_2_Hacks-asanso.pdf(file size: 9.46 MB, MIME type: application/pdf)

The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and more sites rely on distributed services and cloud computing or a third-party application utilizing APIs from multiple services. OAuth 2 is widely used from major internet players (as Google, Facebook, Twitter) in order to secure their (also REST) APIs. This talk will introduce the OAuth 2 framework and it will show security pitfalls and common implementation mistakes.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current02:16, 15 January 2016 (9.46 MB)Schattenbaum (talk | contribs)The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity. As the web grows, more and...
  • You cannot overwrite this file.

There are no pages that link to this file.