Summary

In this chapter, the key words were security, permissions, and authentication. We learned about:

  • How Facebook restricts us from accessing information we're not supposed to
  • How users determine which information other users (and apps) can see
  • How apps can request permission to see more information from users
  • How users and apps work together to authenticate with Facebook

    Key takeaways

    • The Graph API will only give certain details about a person if you try to access a Graph Object without proof of authentication.
    • An access token is proof of authorization, and is associated with both a user and an application.
    • Users have two credentials: e-mail address and password.
    • Applications have three credentials: application ID (which is like a username), application ...

Get Facebook Graph API Development with Flash now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.