Writing Secure PHP - PHP - Added Bytes - 0 views
Hueniverse: Beginner's Guide to OAuth - Part III : Security Architecture - 0 views
-
OAuth's stated objective is to create an 'authorization delegation protocol'. Allowing one party to access someone else's resources on their behalf is the core of the OAuth protocol and the void it seeks to fill. In this delegated access scenario, also known as the 3-legged scenario, the three parties (legs) involved are the Service Provider, Consumer, and User. Since requests are only made by the Consumer, it needs a way to authenticate itself with the Service Provider, but also to authenticate its authorization to access User data. This requires OAuth to support an HTTP request with two sets of credentials.
-
OAuth can do an equally good job at addressing the direct access scenario, also known as the 2-legged scenario.
-
The Consumer is accessing the resources on behalf of itself, making the Consumer and User the same entity. This can be a bit confusing when a Consumer is making separate requests, both 2-legged requests on behalf of itself, and 3-legged requests on behalf of a User.
- ...19 more annotations...
Light Blue Touchpaper - 0 views
Extreme Security -- Do It Securely or Not at all !: Use default password, get hijacked - 0 views
NoScript :: Firefox Add-ons - 0 views
Help Net Security - 0 views
IP address can now pin down your location to within a half mile - 0 views
Online-Demo :: KeyTrac - 0 views
Schneier.com - 0 views
AKADEMİK GÜVENLİK - 0 views
De-anonymizing Social Networks - 0 views
YouTube - SymantecEduc's Channel - 0 views
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES) - 0 views
NetSec Güvenlik Bülteni - 0 views
A5/1 - Trac - 0 views
« First
‹ Previous
41 - 60
Next ›
Showing 20▼ items per page