From CISO Marketplace — the hub for security professionals Visit

OAuth

Data Protection

Definition

Open standard allowing secure delegated access without sharing passwords.

Technical Details

OAuth is an open standard for access delegation, commonly used as a way to grant websites or applications limited access to user information without exposing passwords. OAuth allows users to authorize third-party applications to access their information stored on another service, such as social media or cloud storage, without sharing their credentials. It works through a token-based authentication process where a user authenticates with an authorization server and receives an access token, which can then be used to access resources on behalf of the user. The process involves several key components, including the resource owner (user), client (application), authorization server (issues tokens), and resource server (API that hosts user data). OAuth 2.0, the most widely used version, enhances security and usability by allowing multiple types of grants and flows to accommodate different types of applications.

Practical Usage

OAuth is widely implemented in scenarios where users need to grant third-party applications access to their data without sharing their passwords. Common implementations include social media logins (such as 'Log in with Facebook' or 'Log in with Google'), where users can authenticate to a service using their existing accounts. Additionally, OAuth is used in API services, allowing applications to interact with user data in a secure manner by requesting permission through a standardized flow. Developers can integrate OAuth into their applications to enhance security while providing a seamless user experience.

Examples

Related Terms

OpenID JWT (JSON Web Token) SAML (Security Assertion Markup Language) Federated Identity Access Token
← Back to Glossary