Skip to main content

Posts

Showing posts from August, 2017

OATH Authentication

OATH Authentication Giving access to sensitive information with the users permission. There are usually 4 parties involved in this process. The User, 'The User'. The Application requesting access to the User's data, 'The Requesting Application'. The Application which has the User's data, 'The User's Data Host'. The Application which can grant access to the User's data, 'The Access App'. (A token is just a piece of unique text which the receiver reads and understands and can identify and grant permission to access some data or resource). There are more than 1 steps involved: 'The Requesting Application' requests access to 'The User's data. 'The Requesting Application's request is sent to 'The Access App'. 'The Access App' asks 'The User' if she wishes to grant permission to 'The Requesting Application'. 'The User' agrees and response is sent to 'The...