标签:ecif The his encrypted represent ted repr use elf
https://www.oauth.com/oauth2-servers/access-tokens/
Access tokens are the thing that applications use to make API requests on behalf of a user. The access token represents the authorization of a specific application to access specific parts of a user’s data.
Access tokens must be kept confidential in transit and in storage. The only parties that should ever see the access token are the application itself, the authorization server, and resource server. The application should ensure the storage of the access token is not accessible to other applications on the same device. The access token can only be used over an https connection, since passing it over a non-encrypted channel would make it trivial for third parties to intercept.
The token endpoint is where apps make a request to get an access token for a user. This section describes how to verify token requests and how to return the appropriate response and errors.
标签:ecif The his encrypted represent ted repr use elf
原文地址:https://www.cnblogs.com/chucklu/p/10346433.html