Authorization code

This shares similar principles to the Implicit flow, as both are meant to prevent a client application from ever being exposed to the resource owner's credentials. However, in this flow, a client application stores a client secret in order to later obtain a token.

In this flow, the client application exchanges its client ID, secret, and a code with the authorization server in order to obtain the access token. This is ideal for server-side web applications where a client secret can be securely stored.

This type of flow is also referred to as a Three-Legged OAuth, for similar reasons to the implicit flow, even this this grant requires additional steps.

The flow would be as follows:

Authorization Code Grant Flow
  1. A resource ...

Get Implementing Oracle API Platform Cloud Service now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.