UsefulLinks
Computer Science
Other Tools and Technologies
OAuth and OIDC
1. Introduction to Secure Delegated Access
2. OAuth 2.0 Framework Fundamentals
3. OAuth 2.0 Protocol Endpoints
4. OAuth 2.0 Tokens
5. Scopes and Permissions
6. OAuth 2.0 Authorization Grants
7. OpenID Connect Identity Layer
8. JSON Web Tokens in OAuth and OIDC
9. Security Considerations and Threats
10. Advanced OAuth and OIDC Topics
11. OAuth 2.1 Evolution
12. Implementation Guidance
3.
OAuth 2.0 Protocol Endpoints
3.1.
Authorization Endpoint
3.1.1.
Purpose and Function
3.1.2.
Request Parameters
3.1.2.1.
response_type
3.1.2.2.
client_id
3.1.2.3.
redirect_uri
3.1.2.4.
scope
3.1.2.5.
state
3.1.3.
User Interaction
3.1.3.1.
Authentication Process
3.1.3.2.
Consent Screen
3.1.3.3.
Authorization Decision
3.1.4.
Response Handling
3.1.4.1.
Success Responses
3.1.4.2.
Error Responses
3.2.
Token Endpoint
3.2.1.
Purpose and Function
3.2.2.
Client Authentication
3.2.2.1.
Authentication Methods
3.2.2.2.
Security Requirements
3.2.3.
Grant Processing
3.2.3.1.
Authorization Code Exchange
3.2.3.2.
Token Refresh
3.2.3.3.
Client Credentials
3.2.4.
Token Response Format
3.2.4.1.
Access Token
3.2.4.2.
Refresh Token
3.2.4.3.
Token Metadata
3.3.
Additional Endpoints
3.3.1.
Revocation Endpoint
3.3.2.
Introspection Endpoint
3.3.3.
Registration Endpoint
Previous
2. OAuth 2.0 Framework Fundamentals
Go to top
Next
4. OAuth 2.0 Tokens