Difference between revisions of "Device flow usecase 1"
Pavel.lobko (talk | contribs) (Created page with "Device Flow") |
Pavel.lobko (talk | contribs) |
||
Line 1: | Line 1: | ||
− | Device Flow | + | = Device Flow = |
+ | |||
+ | When you need your IBM i application to deal with protected user data on remote resource behalf of user | ||
+ | This OAuth 2.0 protocol extension enables OAuth clients to | ||
+ | request user authorization from applications on devices that have | ||
+ | limited input capabilities or lack a suitable browser | ||
+ | |||
+ | |||
+ | user authorization |
Revision as of 14:16, 2 April 2020
Device Flow
When you need your IBM i application to deal with protected user data on remote resource behalf of user This OAuth 2.0 protocol extension enables OAuth clients to
request user authorization from applications on devices that have limited input capabilities or lack a suitable browser
user authorization