Flaws in OAuth 2.0: Can OAuth be used as a Security Server
Keywords:Oauth, Proxy servers, Vpns, Authorization tokens
OAuth 2.0 is the business standard convention for approval. OAuth 2.0 spotlights on customer engineer straightforwardness while giving explicit approval streams to web applications, work area applications, cell phones, and lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid versatile applications that utilization OAuth 2.0 APIs from Facebook, Google and Sina—which works Weibo in China—and backing SSO for outsider applications. The scientists found that 41.2 percent of the applications they tried were defenseless against their attackinese.
How to Cite
Copyright (c) 2021 Pankaj Ramcharitra Yadav
This work is licensed under a Creative Commons Attribution 4.0 International License.