Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC 6749: The OAuth 2.0 Authorization Framework2012 RFC
Reflects downloads up to 25 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]

Cited By

  1. ACM
    Hosseyni P, Küsters R and Würtele T (2024). Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process, ACM Transactions on Privacy and Security, 28:1, (1-36), Online publication date: 28-Feb-2025.
  2. Bernabé Murcia J, Cánovas E, García-Rodríguez J, M. Zarca A and Skarmeta A (2025). Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks, Future Generation Computer Systems, 162:C, Online publication date: 1-Jan-2025.
  3. Patil V and Shyamasundar R A Decoupling Mechanism for Transaction Privacy Information Systems Security, (359-379)
  4. Schardong F and Custódio R The Role-Artifact-Function Framework for Understanding Digital Identity Models Conceptual Modeling, (377-395)
  5. Linker F and Basin D SOAP Proceedings of the 33rd USENIX Conference on Security Symposium, (3223-3240)
  6. Cremonezi B, Vieira A, Nacif J, Silva E and Nogueira M (2024). Identity management for Internet of Things, Computer Communications, 224:C, (72-94), Online publication date: 1-Aug-2024.
  7. ACM
    Mousavi Z, Islam C, Moore K, Abuadbba A and Babar M An Investigation into Misuse of Java Security APIs by Large Language Models Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (1299-1315)
  8. ACM
    Möller J, Weißberg F, Pirch L, Eisenhofer T and Rieck K Cross-Language Differential Testing of JSON Parsers Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (1117-1127)
  9. Baseri Y, Chouhan V and Hafid A (2024). Navigating quantum security risks in networked environments, Computers and Security, 142:C, Online publication date: 1-Jul-2024.
  10. ACM
    Thorn S, English K, Butler K and Enck W 5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (66-77)
  11. Mortágua D, Zúquete A and Salvador P (2024). Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0, Computer Networks: The International Journal of Computer and Telecommunications Networking, 244:C, Online publication date: 1-May-2024.
  12. ACM
    Schardong F and Custodio R From Self-Sovereign Identity to Fiduciary Identity: A Journey Towards Greater User Privacy and Usability Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, (687-694)
  13. Cirne A, Sousa P, Resende J and Antunes L (2024). Hardware Security for Internet of Things Identity Assurance, IEEE Communications Surveys & Tutorials, 26:2, (1041-1079), Online publication date: 1-Apr-2024.
  14. Aboukadri S, Ouaddah A and Mezrioui A (2024). Machine learning in identity and access management systems, Computers and Security, 139:C, Online publication date: 1-Apr-2024.
  15. Sousa B and Gonçalves C (2024). FedAAA-SDN, Computer Networks: The International Journal of Computer and Telecommunications Networking, 239:C, Online publication date: 1-Feb-2024.
  16. Ge Y and Zhu Q (2024). GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT Networks, IEEE Transactions on Information Forensics and Security, 19, (540-554), Online publication date: 1-Jan-2024.
  17. ACM
    Akon M, Yang T, Dong Y and Hussain S Formal Analysis of Access Control Mechanism of 5G Core Network Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (666-680)
  18. ACM
    Ardi C and Calder M The Prevalence of Single Sign-On on the Web: Towards the Next Generation of Web Content Measurement Proceedings of the 2023 ACM on Internet Measurement Conference, (124-130)
  19. Helmschmidt F, Hosseyni P, Küsters R, Pruiksma K, Waldmann C and Würtele T The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard Computer Security – ESORICS 2023, (222-242)
  20. Kalantari S, Philippaerts P, Dimova Y, Hughes D, Joosen W and De Decker B A User-Centric Approach to API Delegations Computer Security – ESORICS 2023, (318-337)
  21. ACM
    Gheri L and Yoshida N (2023). Hybrid Multiparty Session Types: Compositionality for Protocol Specification through Endpoint Projection, Proceedings of the ACM on Programming Languages, 7:OOPSLA1, (112-142), Online publication date: 6-Apr-2023.
  22. Gagliardelli L, Zecchini L, Ferretti L, Beneventano D, Simonini G, Bergamaschi S, Orsini M, Magnotta L, Mescoli E, Livaldi A, Gessa N, De Sabbata P, D’Agosta G, Paolucci F and Moretti F (2023). A big data platform exploiting auditable tokenization to promote good practices inside local energy communities, Future Generation Computer Systems, 141:C, (595-610), Online publication date: 1-Apr-2023.
  23. ACM
    Kasahara Y End of Basic Authentication and Migration to Modern Authentication for Exchange Online Proceedings of the 2023 ACM SIGUCCS Annual Conference, (32-35)
  24. Jansen C, Lindequist B, Strohmenger K, Romberg D, Küster T, Weiss N, Franz M, Schwen L, Evans T, Homeyer A and Zerbe N (2023). The vendor-agnostic EMPAIA platform for integrating AI applications into digital pathology infrastructures, Future Generation Computer Systems, 140:C, (209-224), Online publication date: 1-Mar-2023.
  25. ACM
    Jannett L, Mladenov V, Mainka C and Schwenk J DISTINCT Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1553-1567)
  26. Skopik F, Landauer M and Wurzenberger M (2022). Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey, IEEE Security and Privacy, 20:6, (18-26), Online publication date: 1-Nov-2022.
  27. ACM
    Deochake S and Channapattan V Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-8)
  28. ACM
    Aydemir B, Basney J, Bockelman B, Gaynor J and Weitzel D SciAuth: A Lightweight End-to-End Capability-Based Authorization Environment for Scientific Computing Practice and Experience in Advanced Research Computing 2022: Revolutionary: Computing, Connections, You, (1-5)
  29. ACM
    Gao Y, Basney J and Withers A SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments Practice and Experience in Advanced Research Computing 2020: Catch the Wave, (465-468)
  30. Salis A, Jensen J, Bulla R, Mancini G and Cocco P Security and Privacy Management in a Fog-to-Cloud Environment Euro-Par 2019: Parallel Processing Workshops, (99-111)
Contributors
Index terms have been assigned to the content through auto-classification.

Recommendations