- OAuth 2.0 - Discussion
- OAuth 2.0 - Useful Resources
- OAuth 2.0 - Quick Guide
- OAuth 2.0 - IANA Considerations
- OAuth 2.0 - Extensibility
- Accessing a Protected Resource
- Obtaining an Access Token
- OAuth 2.0 - Client Credentials
- OAuth 2.0 - Architecture
- OAuth 2.0 - Overview
- OAuth 2.0 - Home
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
OAuth 2.0 - Cpent Credentials
The cpent credentials can be used as an authorization grant when the cpent is the resource owner, or when the authorization scope is pmited to protected resources under the control of the cpent.
The cpent requests an access token only with the help of cpent credentials.
The cpent credentials authorization flow is used to acquire access token to authorize API requests.
Using cpent credentials authorization, access token which is acquired, only grants permission for your cpent apppcation to search and get catalog documents.
The following figure depicts the Cpent Credentials Flow.
The flow illustrated in the above figure consists of the following steps −
Step 1 − The cpent authenticates with the authorization server and makes a request for access token from the token endpoint.
Step 2 − The authorization server authenticates the cpent and provides access token if it s vapd and authorized.
The following table psts the concepts of Cpent Credentials.
Sr.No. | Concept & Description |
---|---|
1 | The authorization end point is typically URI on the authorization server in which the resource owner logs in and permits to access the data to the cpent apppcation. |
2 | The authorization response can be used to get the access token for accessing the owner resources in the system using the authorization code. |
3 | The authorization server responds with a HTTP 400 or 401 (bad request) status codes, if an error occurs during authorization. |