Hacking OAuth 2.0 : Avoiding Security Pitfalls in Your Deployment

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 120
View all Sessions

OAuth 2.0 is being adopted by many enterprises and cloud service providers. It introduces a three party model that is new to many architects. This session will examine how to best use OAuth 2.0 optional features and avoid common mistakes that have left a number of large deployments open to trivial compromise.


This document was retrieved from on Sat, 20 Dec 2014 01:34:25 -0500.
© 2014 EMC Corporation. All rights reserved.