Hacking OAuth 2.0 : Avoiding Security Pitfalls in Your Deployment

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 120

View all Sessions

OAuth 2.0 is being adopted by many enterprises and cloud service providers. It introduces a three party model that is new to many architects. This session will examine how to best use OAuth 2.0 optional features and avoid common mistakes that have left a number of large deployments open to trivial compromise.


This document was retrieved from on Tue, 01 Dec 2015 11:26:53 -0500.
© 2015 EMC Corporation. All rights reserved.