Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Securing RESTful Web Services with OAuth 2.0

DZone's Guide to

Securing RESTful Web Services with OAuth 2.0

Free Resource

Share, secure, distribute, control, and monetize your APIs with the platform built with performance, time-to-value, and growth in mind. Free 90-day trial of 3Scale by Red Hat


One of the questions we get asked the most by developers and architects is: when and why would I use OAuth2? The answer, as often with such questions, is "it depends", but there are some features of OAuth2 that make it compelling in some situations, especially in systems composed of many lightweight web services, which becoming a very common architectural pattern.


This presentation will not go into a lot of detail about the OAuth2 protocol and related specifications, but will attempt to show some of the key features of a system secured with OAuth2 and the decision points when choosing to build such a system.

Explore the core elements of owning an API strategy and best practices for effective API programs. Download the API Owner's Manual, brought to you by 3Scale by Red Hat

Topics:
java ,enterprise-integration ,architecture ,tutorial ,oauth

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}