This presentation will not go into a lot of detail about the OAuth2 protocol and related specifications, but will attempt to show some of the key features of a system secured with OAuth2 and the decision points when choosing to build such a system.
Source : http://www.youtube.com/watch?v=8uBcpsIEz2I
No comments:
Post a Comment