reading-notes

Class Fifteen Notes (301)

Authentication

OAuth1

  1. The first website connects to the second website on behalf of the user, using OAuth, providing the user’s verified identity;
  2. The second site generates a one-time token and one-time secret unique key to the transaction and parties involved
  3. The first site gives he token and the secret to the initiating user’s client software, which t=hen presents the request token and secret to their authorization provider
  4. If not already authenticated, the client may be asked to authenticate
  5. The user appvoes a particular transaction type at the first website;
  6. The user gives the approved access token to the first site, which then gives the access token to the second website as proof of athentication; 7 The second site lets the first site access their site on behalf of the user; 8 The user sees a successfullly completed transaction occuring

Authorization and Authentication flows2

What is Resource Owner Password Flow?

Back to main page

References

  1. https://www.csoonline.com/article/3216404/what-is-oauth-how-the-open-authorization-framework-works.html 

  2. https://auth0.com/docs/get-started/authentication-and-authorization-flow