Content Icon

OAuth 2.0: A Primer

September 9, 2020 | Ask-An-Expert Writeups | Authentication | By Wolfgang Goerlich, IANS Faculty

This report provides a primer on OAuth 2.0, along with recommendations for authorization flows and token storage.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Washington, DC Virtual Symposium – IAM and File Security: Advanced Tools and Techniques

Many users still have advanced file access permissions when they shouldn’t. Several tools and techniques can help tighten up access, but you need to know about them first.

Top Reasons for Shifting to a Zero-Trust Model

What motivates organizations to initiate or build out a Zero Trust program? Data security tops the list with 85 percent, followed by breach prevention (70%) and reduction of threats to endpoints (56%). Beyond industry, regulatory and internal compliance, nearly a third are seeking to address hybrid IT security issues.