While the specifications formed the basis for the description and diagrams of the individual protocol flows, a number of other online resources were used in preparation of this book.
OAuth 2.0 draft
OAuth 2.0 threat model and security considerations
OAuth 2.0: Bearer tokens
OAuth 2.0: MAC access authentication
OpenID Connect Basic, Standard and Messages
JSON Web Token (JWT)
OAuth 2.0: Token revocation
Facebook Authentication
Facebook Graph API
Digging Deeper into OAuth 2.0 on Force.com
Authenticating Remote Access with Salesforce
Google OAuth 2.0
Google’s Internet Identity Research
Google’s OAuth 2.0 Controllers for iOS
OAuth 2.0 on Android
OAuth 2.0 on Android with Google Tasks
Windows Live SDK—OAuth 2.0
OAuth IETF Working Group
OpenID Connect Working Group
Google’s oauth2-dev forum for questions about their OAuth 2.0 implementation
Google Code blog—OAuth 2.0 changes
hueniverse blog—OAuth 2.0 (Without Signatures) Is Bad for the Web
OAuth 2.0 flow diagrams
3.145.17.140