Very good video, I have a question if I am developing an app, my server would do authentication service based on what I implement and authorization server, right? In the latter I should implement the access by roles, within the same token as information I would get the scope to compare whether or not you have access to the resource? Thank you very much
Oauth 3-legged is an absolute nightmare garbage mess of a dev project that should fire whomever thought this level of complication should’ve ever existed.
Great call flows. It is easy to understand. Thank you alot
Very good video, I have a question if I am developing an app, my server would do authentication service based on what I implement and authorization server, right? In the latter I should implement the access by roles, within the same token as information I would get the scope to compare whether or not you have access to the resource?
Thank you very much
Oauth 3-legged is an absolute nightmare garbage mess of a dev project that should fire whomever thought this level of complication should’ve ever existed.