it works well for both web and native client applications. It can be scaled from a small single-user application up to a multimillion-user internet API. It’s as much at home on the untamed wilds of the web, where it grew up and is used to protect user-facing APIs of all types, as it is inside the controlled and monitored boundaries of an enterprise, where it’s being used to manage access to a new generation of internal business APIs and systems.
And that’s not all: if you’ve used mobile or web technology in
- Chapter 1. What is OAuth 2.0 and why should you care?
- from OAuth 2 in Action
- Publisher: Manning Publications
- Released: March 2017
This is a note
Share this highlighthttp://www.safaribooksonline.com/a/oauth-2-in/8817102/