From the course: 5G Core Network with Simulations: Architecture, Cloud Integration, Call Flows, Security

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

OAuth 2.0: Authentication framework overview

OAuth 2.0: Authentication framework overview

Let's talk about the OAuth which is providing the secure access through the APIs. Let's imagine you are going to a concert, you get a VIP pass but you will have access only maybe to the lounge, not to the whole venue. That's exactly how OAuth works. It gives access only temporarily and to the specific resources. Let's say a calendar app wants to see your events on your phone. With OAuth, it can only access to the calendar and not to your emails or to your contacts. So this means it has a limited access only to the calendar in this case. So app gets what it needs and nothing extra. You are not sharing your password. You'll never give the app your password. And that's what we want. We want to have a secure connections where OAuth handles it by using secure tokens, kind of like a wallet ticket. The app gets a ticket, but not the keys. You are always in control. You get to approve or deny the access. And even later on, you can go in and revoke that access if you change your mind. It's…

Contents