OAuth is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
| FactSnippet No. 854,249 |
OAuth is an open standard for access delegation, commonly used as a way for internet users to grant websites or applications access to their information on other websites but without giving them the passwords.
| FactSnippet No. 854,249 |
Generally, OAuth provides clients a "secure delegated access" to server resources on behalf of a resource owner.
| FactSnippet No. 854,250 |
OAuth began in November 2006 when Blaine Cook was developing the Twitter OpenID implementation.
| FactSnippet No. 854,251 |
Eran Hammer joined and coordinated the many OAuth contributions creating a more formal specification.
| FactSnippet No. 854,252 |
At the 73rd Internet Engineering Task Force meeting in Minneapolis in November 2008, an OAuth BoF was held to discuss bringing the protocol into the IETF for further standardization work.
| FactSnippet No. 854,253 |
OAuth is a service that is complementary to and distinct from OpenID.
| FactSnippet No. 854,254 |
OAuth is unrelated to OATH, which is a reference architecture for authentication, not a standard for authorization.
| FactSnippet No. 854,255 |
However, OAuth is directly related to OpenID Connect, since OIDC is an authentication layer built on top of OAuth 2.
| FactSnippet No. 854,256 |
OAuth is unrelated to XACML, which is an authorization policy standard.
| FactSnippet No. 854,257 |
OAuth is an authorization protocol, rather than an authentication protocol.
| FactSnippet No. 854,258 |
However, because OAuth was not designed with this use case in mind, making this assumption can lead to major security flaws.
| FactSnippet No. 854,259 |
XACML and OAuth can be combined to deliver a more comprehensive approach to authorization.
| FactSnippet No. 854,260 |
Where OAuth focuses on delegated access, and identity-centric authorization, XACML takes an attribute-based approach which can consider attributes of the user, the action, the resource, and the context .
| FactSnippet No. 854,261 |
OAuth is limited in granularity to the coarse functionality exposed by the target service.
| FactSnippet No. 854,262 |