DZone Security Zone
Table of Contents
- OAuth 2.0 framework overview
- Authorization code flow
- PKCE
- Reference tokens vs self-contained
- Introspection endpoint
- JWT validation
- OAuth Authorization server frontend
/authorize
path and parameters
- OAuth Authorization server endpoints
/authorize
/token
- OIDC and Authentication
- User sign-in and registration
1. OAuth 2.0 Framework Overview
“OAuth 2.0 is the industry-standard protocol for authorization.”
To start, I would like to draw your attention to the main goal of the OAuth framework: authorization delegation. It’s very important to understand it to not be confused with the use cases it covers. The most common confusion about it is thinking of it as an authentication solution, but it is not. Looking ahead, authentication might be implemented on top of OAuth 2.0 with OpenID Connect, which is an additional identity layer.
Read the original article: