Useful Links
Computer Science
Other Tools and Technologies
OAuth and OIDC
1. Introduction to Secure Delegated Access
2. OAuth 2.0 Framework Fundamentals
3. OAuth 2.0 Protocol Endpoints
4. OAuth 2.0 Tokens
5. Scopes and Permissions
6. OAuth 2.0 Authorization Grants
7. OpenID Connect Identity Layer
8. JSON Web Tokens in OAuth and OIDC
9. Security Considerations and Threats
10. Advanced OAuth and OIDC Topics
11. OAuth 2.1 Evolution
12. Implementation Guidance
OAuth 2.0 Protocol Endpoints
Authorization Endpoint
Purpose and Function
Request Parameters
response_type
client_id
redirect_uri
scope
state
User Interaction
Authentication Process
Consent Screen
Authorization Decision
Response Handling
Success Responses
Error Responses
Token Endpoint
Purpose and Function
Client Authentication
Authentication Methods
Security Requirements
Grant Processing
Authorization Code Exchange
Token Refresh
Client Credentials
Token Response Format
Access Token
Refresh Token
Token Metadata
Additional Endpoints
Revocation Endpoint
Introspection Endpoint
Registration Endpoint
Previous
2. OAuth 2.0 Framework Fundamentals
Go to top
Next
4. OAuth 2.0 Tokens