Flaws in OAuth 2.0: Can OAuth be used as a Security Server

Authors

  • Pankaj Ramcharitra Yadav Department of MCA, ASM Institute of Management & Computer Studies, Thane, India

Keywords:

Oauth, Proxy servers, Vpns, Authorization tokens

Abstract

OAuth 2.0 is the business standard convention for approval. OAuth 2.0 spotlights on customer engineer straightforwardness while giving explicit approval streams to web applications, work area applications, cell phones, and lounge room gadgets. The scientists analyzed 600 top U.S. also, ChAndroid versatile applications that utilization OAuth 2.0 APIs from Facebook, Google and Sina—which works Weibo in China—and backing SSO for outsider applications. The scientists found that 41.2 percent of the applications they tried were defenseless against their attackinese.

Downloads

Download data is not yet available.

Downloads

Published

12-07-2021

Issue

Section

Articles

How to Cite

[1]
P. R. Yadav, “Flaws in OAuth 2.0: Can OAuth be used as a Security Server”, IJRESM, vol. 4, no. 7, pp. 107–109, Jul. 2021, Accessed: Nov. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/982