OATH Authentication Giving access to sensitive information with the users permission. There are usually 4 parties involved in this process. The User, 'The User'. The Application requesting access to the User's data, 'The Requesting Application'. The Application which has the User's data, 'The User's Data Host'. The Application which can grant access to the User's data, 'The Access App'. (A token is just a piece of unique text which the receiver reads and understands and can identify and grant permission to access some data or resource). There are more than 1 steps involved: 'The Requesting Application' requests access to 'The User's data. 'The Requesting Application's request is sent to 'The Access App'. 'The Access App' asks 'The User' if she wishes to grant permission to 'The Requesting Application'. 'The User' agrees and response is sent to 'The...
Layman explanations of Software coding and configuration techniques. With example code where possible.