码迷,mamicode.com
首页 > 数据库 > 详细

AccessTokens

时间:2019-02-01 18:02:09      阅读:190      评论:0      收藏:0      [点我收藏+]

标签:ecif   The   his   encrypted   represent   ted   repr   use   elf   

https://www.oauth.com/oauth2-servers/access-tokens/

Access tokens are the thing that applications use to make API requests on behalf of a user. The access token represents the authorization of a specific application to access specific parts of a user’s data.

Access tokens must be kept confidential in transit and in storage. The only parties that should ever see the access token are the application itself, the authorization server, and resource server. The application should ensure the storage of the access token is not accessible to other applications on the same device. The access token can only be used over an https connection, since passing it over a non-encrypted channel would make it trivial for third parties to intercept.

The token endpoint is where apps make a request to get an access token for a user. This section describes how to verify token requests and how to return the appropriate response and errors.

AccessTokens

标签:ecif   The   his   encrypted   represent   ted   repr   use   elf   

原文地址:https://www.cnblogs.com/chucklu/p/10346433.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!