{"id":2147,"date":"2014-08-29T11:09:03","date_gmt":"2014-08-29T10:09:03","guid":{"rendered":"http:\/\/iamwcew.fr.oracle.com\/blog\/?p=2147"},"modified":"2014-08-29T11:09:03","modified_gmt":"2014-08-29T10:09:03","slug":"oauth-definitions","status":"publish","type":"post","link":"https:\/\/gpmfactory.com\/index.php\/2014\/08\/29\/oauth-definitions\/","title":{"rendered":"OAuth &#8211; Definitions"},"content":{"rendered":"<p>D\u00e9finitions provenant du site:\u00a0http:\/\/hueniverse.com\/2007\/10\/04\/beginners-guide-to-oauth-part-i-overview\/<\/p>\n<p>\u00e9crit par Eran Hammer<!--more--><\/p>\n<ul>\n<li><strong>Service Provider<\/strong>\u00a0\u2013 the Service Provider controls all aspects of the OAuth implementation. The Service Provider is the term used to describe the website or web-service where the restricted resources are located. It can be a photo sharing site where users keep albums, an online bank service, a microblogging site, or any other service where \u2018user\u2019s private stuff\u2019 is kept. OAuth does not mandate that the Service Provider will also be the identity provider which means the Service Provider can use its own usernames and passwords to authenticate users, or use other systems such as OpenID.<\/li>\n<\/ul>\n<ul>\n<li><strong>User<\/strong>\u00a0\u2013 the user is why OAuth exists and without users, there is no need for OAuth. The users have \u2018stuff\u2019 they don\u2019t want to make public on the Service Provider, but they do want to share it with another site. In OAuth, the protocol stops without manual interaction with the user at least once to receive permission to grant access.<\/li>\n<\/ul>\n<ul>\n<li><strong>Consumer<\/strong>\u00a0\u2013 this is a fancy name for an application trying to access the User\u2019s resources. This can be a website, a desktop program, a mobile device, a set-top box, or anything else connected to the web. The Consumer is the one getting permission to access resources and the Consumer is where the useful part of OAuth happens. OAuth defines \u2018Consumer Developer\u2019 as the entity writing code to interact with the Service Provider. \u2018Consumer Key\u2019 and \u2018Consumer Secret\u2019 will be explained later.<\/li>\n<\/ul>\n<ul>\n<li><strong>Protected Resources<\/strong>: the \u2018stuff\u2019 OAuth protects and allow access to. This can be data (photos, documents, contacts), activities (posting blog item, transferring funds) or any URL with a need for access restrictions.<\/li>\n<\/ul>\n<ul>\n<li><strong>Tokens<\/strong>\u00a0\u2013 are used instead of User credentials to access resources. A Token is generally a random string of letters and numbers (but not limited to) that is unique, hard to guess, and paired with a Secret to protect the Token from being abused. OAuth defines two different types of Tokens: Request and Access. This are explained later in greater details.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>D\u00e9finitions provenant du site:\u00a0http:\/\/hueniverse.com\/2007\/10\/04\/beginners-guide-to-oauth-part-i-overview\/ \u00e9crit par Eran Hammer<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,10],"tags":[77],"ppma_author":[150],"class_list":["post-2147","post","type-post","status-publish","format-standard","hentry","category-anglais","category-notes","tag-oauth"],"authors":[{"term_id":150,"user_id":1,"is_guest":0,"slug":"admin8700","display_name":"Patrick","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/209d5ed69b74d288390621ab4c1d3773?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/posts\/2147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/comments?post=2147"}],"version-history":[{"count":0,"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/posts\/2147\/revisions"}],"wp:attachment":[{"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/media?parent=2147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/categories?post=2147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/tags?post=2147"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/gpmfactory.com\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}