Generating cryptographically secure authentication tokens

后端 未结 7 1710
后悔当初
后悔当初 2020-12-22 15:15

Background:

This is really a general best-practices question, but some background about the specific situation might be helpful:

We are deve

相关标签:
7条回答
  • 2020-12-22 16:02

    You should implement:

    1. OAuth2 Implicit Grant - for third-party applications http://tools.ietf.org/html/rfc6749#section-1.3.2
    2. OAuth2 Resource Owner Password Credentials — for your own mobile application http://tools.ietf.org/html/rfc6749#section-1.3.3

    which are exactly the workflows, from OAuth2, that you are looking for. Do not reinvent the wheel.

    0 讨论(0)
提交回复
热议问题