
Episode 376: Justin Richer On API Security with OAuth 2
Software Engineering Radio - the podcast for professional software developers
00:00
The Key Strengths of OAuth Token Based Models
OAuth tokens are computer generated and the user never even has to see them. So they don't have to be memorized or memorable, and the user doesn't have to manage them at all. And that automatically allows both sides of the table, as it were, to monitor who's doing what because everyone has a different identifiable access token.
Transcript
Play full episode