Generated by GPT-5-mini| OAuth (service) | |
|---|---|
| Name | OAuth |
| Developer | Internet Engineering Task Force |
| Released | 2010 |
| Latest release | OAuth 2.0 (RFC 6749) |
| Programming languages | Multiple |
| Platform | Web |
| License | Open standard |
OAuth (service) OAuth is an open authorization standard used to delegate access among Google, Facebook, Twitter, Microsoft, and other Amazon-hosted applications. It enables third-party services such as Dropbox, GitHub, LinkedIn, Salesforce, and Slack to access user resources managed by identity providers including Okta, Auth0, Ping Identity, and Keycloak. Originating from work involving organizations like Yahoo!, Google, Twitter, Microsoft, and the Internet Engineering Task Force, OAuth is foundational to modern integrations across platforms such as Apple, Netflix, Spotify, Uber Technologies, and Airbnb.
OAuth provides a standardized mechanism whereby clients obtain scoped, time-limited permissions to act on behalf of resource owners hosted by servers like Amazon Web Services, Google Cloud Platform, Microsoft Azure, and Heroku. Service models in which OAuth appears include social login flows at Facebook, delegated API access at GitHub, and consent-driven data sharing at Strava and Fitbit. The standard is specified by the Internet Engineering Task Force through documents such as RFC 6749 and RFC 6750, which are frequently discussed at venues including IETF Hackathons, DEF CON, Black Hat USA, and conferences hosted by OWASP.
The OAuth protocol emerged from collaborations among engineers at Blaine Cook, Erik Wilde, and representatives of companies like Yahoo!, Twitter, Google, and Microsoft. Early prototypes influenced efforts at LinkedIn and Flickr while formalization occurred within the IETF working groups. OAuth 1.0 saw adoption by platforms including Flickr, Tumblr, and Twitter before security concerns led to OAuth 2.0 development with contributions from organizations such as Facebook, Google, Microsoft, PayPal, and academic researchers associated with Stanford University and Massachusetts Institute of Technology. Subsequent incidents analyzed by teams at Google and Facebook prompted revisions and guidance circulated at RSA Conference and in advisories by CERT.
The OAuth model defines roles: resource owner accounts hosted by Google Accounts, Facebook Login, or Microsoft Account; client applications such as Google Workspace Marketplace apps, Slack bots, or Salesforce integrations; authorization servers run by Okta or Auth0; and resource servers hosting APIs like YouTube Data API, GitHub API, Twitter API, and Spotify Web API. Key artifacts include access tokens, refresh tokens, and authorization codes used in flows for services like Dropbox and Box. Implementations often leverage standards from IETF and interoperability efforts by organizations such as OpenID Foundation, Kantara Initiative, and W3C to integrate with identity layers like OpenID Connect and protocols like SAML.
OAuth defines flows tailored to scenarios: the authorization code grant used by web applications deployed to Heroku or Google App Engine; the implicit grant seen historically in single-page apps for platforms like Facebook and Twitter; the client credentials grant used by backend services at Amazon Web Services and Azure; and the resource owner password credentials grant occasionally used in enterprise integrations at Salesforce and SAP. Mobile and native app patterns reference practices promoted by IETF and vendors such as Apple and Google Android, while device authorization flows are deployed by services like Netflix and Roku.
Security advisories from CERT, incident reports by Facebook, and postmortems from Twitter and GitHub highlight risks including token leakage, replay attacks, and misconfigured redirect URIs impacting platforms like Stack Exchange and Reddit. Mitigations recommended by IETF and security groups such as OWASP include PKCE, token binding, short-lived tokens used by AWS Security Token Service, and stringent redirect URI validation employed by Google Identity Services. Threat models discussed at Black Hat Europe, RSA Conference, and in academic papers from Carnegie Mellon University and University of Cambridge inform hardening strategies adopted by identity providers such as Okta and Ping Identity.
Major cloud providers and platforms implement OAuth across services: Google Cloud Platform for Cloud APIs, Microsoft Azure Active Directory for enterprise apps, Amazon Cognito for mobile backends, and Auth0 for third-party identity management. Open-source libraries exist across ecosystems: implementations in Node.js, Python (libraries like those from Django and Flask ecosystems), Java stacks used by Spring Framework, and Ruby on Rails gems. Ecosystem tooling by companies like Okta, ForgeRock, OneLogin, and Keycloak enables integration with enterprise directories including Active Directory and LDAP deployments.
OAuth-related deployments intersect with regulatory regimes such as the General Data Protection Regulation, California Consumer Privacy Act, Health Insurance Portability and Accountability Act, and guidance from authorities like European Data Protection Board and Federal Trade Commission. Platform policies from Apple, Google, Facebook, and Twitter constrain consent UX and data-use practices, which have triggered enforcement actions, audits, and litigation involving firms like Cambridge Analytica and investigations by bodies such as the Information Commissioner's Office and Federal Communications Commission. Privacy-preserving extensions and standards work involve collaborations among Kantara Initiative, OpenID Foundation, and academic researchers from Harvard University.