This resource is no longer available

The Essentials of OAuth: Key to BYOD

Cover

A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the Cloud. More and more, it will be through APIs that cloud data moves; however, the security and scalability of APIs are currently threatened by a problem called the password anti-pattern. This is the need for API clients to collect and replay the password for a user at an API in order to access information on behalf of that user via that API.

OAuth 2.0 defeats the password anti-pattern, creating a consistent, flexible identity and policy architecture for web applications, web services, devices and desktop clients attempting to communicate with Cloud APIs. 

Vendor:
Ping Identity Corporation
Posted:
13 May 2013
Published:
28 Feb 2013
Format:
PDF
Length:
14 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.