Font Size: a A A

A Research On The OAuth Protocol And Its Usage In Social Web Applications

Posted on:2013-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y G ZhuFull Text:PDF
GTID:2248330362474304Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the gradual development of the Internet, the size of the network continues toexpand, newthought and technology continues tocome up, more and moreweb applica-tions are created and merged into people’s daily sociallife. Because of these changes,people are enjoying a more and more easy life.But at the same time, we can’t ignore thatsome problems are becoming more and more serious. Increasing number of applicationcomes with the increasing account number. People are suffering from remembering andmanaging user names and passwords, which causes the increasing difficulty of protect-ing user privacies. Meanwhile, the lack of sharing users’ resources between differentapplications is definitelya big problem for our social people.By analyzing three kinds of resource-sharing mode, which are the full trust appssharing mode, two-legged resource sharing mode and three-legged resource sharingmode, we findthat third-party application can act on behalf of resource owner to mani-pulate the resources in specified applications, after acquiring a user-authorized accesstokenby using the OAuth protocol.Based on the working experience in DX, which isthe largest foreign-oriented B2CCompany in China, this paper first described the OAuth1.0and OAuth2.0protocol, andtheir working procedures. And then this paper analyzes the actors in the protocols andworks outsome use-case diagrams for the OAuth protocol. Based on the use-case dia-grams, this paper continues to describe how tobuild a high performance and high scala-ble web applicationby using the C#language and the MongoDB database.This paper also describes how we can benefit from the OAuth protocol, which in-cludescross-border use of protected resources, unique identity for all web applicationsand also how can we put the Internet work for us.
Keywords/Search Tags:OAuth, Social Web, Resource Sharing, Authorization
PDF Full Text Request
Related items