This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
OAuth Web Authorization Protocol
January/February 2012 (vol. 16 no. 1)
pp. 74-77
Barry Leiba, Huawei Technologies

Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as blogs, photo sharing, and social networks have become widely popular. OAuth, a new protocol for establishing identity management standards across services, provides an alternative to sharing our usernames and passwords, and exposing ourselves to attacks on our online data and identities.

1. The OAuth 2.0 Authorization Protocol, IETF OAuth Working Group draft, work in progress, Sept. 2011.
2. The OAuth 2.0 Authorization Protocol: Bearer Tokens, IETF OAuth Working Group draft, work in progress, Oct. 2011.
3. HTTP Authentication: MAC Access Authentication, IETF OAuth Working Group draft, work in progress, May 2011.
4. OAuth 2.0 Threat Model and Security Considerations, IETF OAuth Working Group draft, work in progress, July 2011.
5. The OAuth 1.0 Protocol, IETF RFC 5849, Apr. 2010; http://tools.ietf.org/htmlrfc5849.

Index Terms:
authorization, access control, social networking, Web services, identity management
Citation:
Barry Leiba, "OAuth Web Authorization Protocol," IEEE Internet Computing, vol. 16, no. 1, pp. 74-77, Jan.-Feb. 2012, doi:10.1109/MIC.2012.11
Usage of this product signifies your acceptance of the Terms of Use.