Open Authentication (OAuth)
Bilguun Tegshbayar
Third-Year Software Engineering Student Eager to Innovate and Learn | Seeking Opportunities for Growth | Looking for an Internship for 2025 Summer | Cybersecurity enthusiast
What is it?
OAuth (Open Authorization) is an internet protocol that authorizes users to grant third-party applications access to their web resources without sharing their passwords.
History
Early 2000s: Pre-OAuth Era: Before OAuth, various proprietary solutions were used for delegated access, including password sharing and custom APIs. These methods had significant security and usability issues, such as the need to share passwords with third-party applications.
2006: The Need for a Standard: In 2006, Blaine Cook (lead developer at Twitter) and Ma.gnolia (a social bookmarking service) were working on solutions to enable users to grant third-party applications access to their resources without sharing passwords. They recognized the need for a standardized protocol for this purpose.
2007: OAuth 1.0 Drafting: In November 2007, a group of developers from various companies (including Twitter, Ma.gnolia, and others) came together to draft the initial version of OAuth. The goal was to create a simple, secure, and standardized way for users to delegate access to their resources.
2008-2009: Adoption and Feedback: OAuth 1.0 gained rapid adoption by major web service providers, including Google, Yahoo, and Twitter. As more developers and companies implemented OAuth, they provided feedback on the protocol's complexities and areas for improvement.
April 2010: OAuth 2.0 Development: In response to the feedback on OAuth 1.0, the OAuth Working Group was formed within the Internet Engineering Task Force (IETF) to develop OAuth 2.0. The goal was to simplify the protocol while maintaining security and flexibility.
October 2012: OAuth 2.0 RFC 6749: OAuth 2.0 was finalized and published as RFC 6749 in October 2012. OAuth 2.0 introduced significant changes, including:
领英推荐
Post-2012: Widespread Adoption: OAuth 2.0 quickly became the industry standard for authorization, with widespread adoption by major platforms such as Google, Facebook, Microsoft, and GitHub. It is used in a variety of applications, including mobile apps, web apps, and APIs.
Key Security Features of OAuth
Common Security Threats and Mitigations
Reference: