Out of all the OAuth Flows, I feel like Authorization Grant Flow brings almost all the possible platoons in making up the OAuth protocol. Remembering the key components and their roles are key. In order to explain the following terms,
- Resource Owner
- Client
- Authorization Server
- Authorization EndPoint
- Token End Point
- Auth Code
- Bearer Token
- Protected Resource and how they are all wired together. But just that I will be using Breaking Bad Analogy to explain the same. Below are image and the link to my hosted video that does the same.
Top comments (2)
Did you make all this?
This is a work of comedic and educational genius beyond my current capabilities of either.
Well that was the most motivational feedback I have ever got π Thank you