OATH Authentication
Giving access to sensitive information with the users permission.
There are usually 4 parties involved in this process.
- The User, 'The User'.
- The Application requesting access to the User's data, 'The Requesting Application'.
- The Application which has the User's data, 'The User's Data Host'.
- The Application which can grant access to the User's data, 'The Access App'.
(A token is just a piece of unique text which the receiver reads and understands and can identify and grant permission to access some data or resource).
There are more than 1 steps involved:
- 'The Requesting Application' requests access to 'The User's data.
- 'The Requesting Application's request is sent to 'The Access App'.
- 'The Access App' asks 'The User' if she wishes to grant permission to 'The Requesting Application'.
- 'The User' agrees and response is sent to 'The Access App'.
- 'The Access App' responds to 'The Requesting Application' granting permission.
- 'The Access App' sends a Token to 'The Requesting Application'.
- 'The Requesting Application' now sends requests to 'The User's Data Host' and attaches the Token to the request.
- 'The User's Data Host' responds to 'The Requesting Application' with the data.
Comments