Conclusion

Now that we’ve concluded our exploration of OpenID, OAuth, and the hybrid auth extension, we can clearly see how combining specifications delivers both the rich capabilities of an authentication sign-in model and the extensive amount of data and viral channels that are available through the authorization standards.

In this chapter, we have identified the questions you should ask yourself before implementing the hybrid auth extension and delved into practical implementation examples to see how these two standards are combined.

We have now experienced firsthand the extensive capabilities that are available in both specifications, and discovered the potential they offer us for creating efficient and powerful login and personalization systems.

Get Programming Social Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.