What is OAuth (Open Authorization) ? Last Updated : 01 Nov, 2023 Summarize Comments Improve Suggest changes Share Like Article Like Report OAuth (Open Authorization) is an open standard protocol for authorization of an application for using user information, in general, it allows a third party application access to user related info like name, DOB, email or other required data from an application like Facebook, Google etc. without giving the third party app the user password. It is pronounced as oh-auth . You might have seen a "login with Google" or "login with Facebook" button on the login/signup page of a website that makes easier to get using the service or website by simply logging into one of the services and grant the client application permission to access your data without giving Password. This is done with the OAuth. It is designed to work with HTTP(Hyper Text Transfer Protocol) and it allows access tokens to be issued to the third party application by an authorization server with the approval from the owner. There are 3 Components in OAuth Mechanism - OAuth Provider - This is the OAuth provider Eg. Google, FaceBook etc.OAuth Client - This is the website where we are sharing or authenticating the usage of our information. Eg. GeeksforGeeks etc.Owner - The user whose login authenticates sharing of information. OAuth can be implemented via google console for "Login/Sign Up with Google" on a web app. Pattern to be Followed - Get OAuth 2.0 Client ID from Google API ConsoleNext, Obtain an access token from the Google Authorization Server to access the API.Send the request with the access token to an API .Get Refresh token if longer access is required. Comment More infoAdvertise with us Next Article Explain HTTP authentication M MayankKhare Follow Improve Article Tags : Ethical Hacking Information-Security Similar Reads How does the Token-Based Authentication work ? Digital transformation brings security concerns for users to protect their identity from bogus eyes. According to US Norton, on average 8 lakh accounts are being hacked every year. There is a demand for high-security systems and cybersecurity regulations for authentication. Traditional methods rely 6 min read What is Blockchain Authentication? Blockchain authentication is a secure method of verifying the identity of users and devices in a digital environment using blockchain technology. Unlike traditional authentication systems, which often rely on centralized databases and passwords, blockchain authentication leverages decentralized netw 7 min read Authentication in Computer Network Prerequisite - Authentication and Authorization Authentication is the process of verifying the identity of a user or information. User authentication is the process of verifying the identity of a user when that user logs in to a computer system. There are different types of authentication systems wh 4 min read Explain HTTP authentication We are in big doors to the digital era where comfort is the main driver. Enjoying all the convenience right from ordering merchandise and paying bills to get services while sitting on the couch. This is how we developed the internet to work for us. Here, authentication comes in and every web resourc 5 min read Types of Authentication Protocols User authentication is the first most priority while responding to the request made by the user to the software application. There are several mechanisms made which are required to authenticate the access while providing access to the data. In this blog, we will explore the most common authenticatio 3 min read SAML Authentication SAML is an XML based framework that stands for Security Assertion Markup Language. SAML is used to enable SSO (Single-Sign-On). SSO allows users to log in once and gain access to multiple applications without having to sign in separately to each one. Example - When you log in to your Google Account, 4 min read Like