Hacking OAuth 2.0 : Avoiding Security Pitfalls in Your Deployment

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 120

View all Sessions

OAuth 2.0 is being adopted by many enterprises and cloud service providers. It introduces a three party model that is new to many architects. This session will examine how to best use OAuth 2.0 optional features and avoid common mistakes that have left a number of large deployments open to trivial compromise.


This document was retrieved from on Fri, 09 Oct 2015 16:06:36 -0400.
© 2015 EMC Corporation. All rights reserved.