Flaws in OAuth 2.0: Can OAuth be used as a Security Server
Keywords:
Oauth, Proxy servers, Vpns, Authorization tokensAbstract
OAuth 2.0 is the business standard convention for approval. OAuth 2.0 spotlights on customer engineer straightforwardness while giving explicit approval streams to web applications, work area applications, cell phones, and lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid versatile applications that utilization OAuth 2.0 APIs from Facebook, Google and Sina—which works Weibo in China—and backing SSO for outsider applications. The scientists found that 41.2 percent of the applications they tried were defenseless against their attackinese.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Pankaj Ramcharitra Yadav
This work is licensed under a Creative Commons Attribution 4.0 International License.