Hacking OAuth 2.0 : Avoiding Security Pitfalls in Your Deployment

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 120

View all Sessions

OAuth 2.0 is being adopted by many enterprises and cloud service providers. It introduces a three party model that is new to many architects. This session will examine how to best use OAuth 2.0 optional features and avoid common mistakes that have left a number of large deployments open to trivial compromise.


This document was retrieved from on Sat, 17 Nov 2018 12:08:02 -0500.