Hacking OAuth 2.0 : Avoiding Security Pitfalls in Your Deployment

  • Friday, March 1, 2013 | 11:40 AM – 12:00 PM | Room: Room 120

View all Sessions

OAuth 2.0 is being adopted by many enterprises and cloud service providers. It introduces a three party model that is new to many architects. This session will examine how to best use OAuth 2.0 optional features and avoid common mistakes that have left a number of large deployments open to trivial compromise.


This document was retrieved from on Mon, 19 Aug 2019 10:06:42 -0400.