Introduction to authentication techniques Flashcards

1
Q

OAuth

A

one common protocol used by all the main social media networks.

OAuth is simply an authorization protocol that allows user to share data with an application without sharing the password. It is a way to obtain a secure authorization scheme based on a token-based authorization mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of authentication

A

User authentication

API authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we need to use OAuth?

A

full security;
standardized;
the most proper and reliable technique that adheres to the developer policy;
it gives the highest available quota

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OAuth1 vs OAuth2

A

OAuth1 and OAuth2. OAuth2 is a fully rewritten improved version of OAuth1. It defines four roles for client, authorization server, resource server and resource owner while OAuth1 uses different concepts to describe the roles. There are also multiple technical differences related for example to cryptography, but a complete analysis is beyond the scope of this chapter. We can conclude that OAuth2 is slightly less complicated and easier to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UTF-8

A

Universal Coded Character set Transformation Format 8bit

as of September 2019 accounts for 94.0% of all web pages (some of which are simply ASCII, as it is a subset of UTF-8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly