Return to Article Details Flaws in OAuth 2.0: Can OAuth be used as a Security Server Download Download PDF