![]() ![]() ![]() Usernames, passwords, and other information private.įor example, an application can use OAuth 2.0 to obtain permission OAuth 2.0 allows users to share specific data with an application while keeping their This document explains how applications installed on devices like phones, tablets, andĬomputers use Google's OAuth 2.0 endpoints to authorize access to You've selected the right flow for your application. Overview summarizes OAuth 2.0 flows that Google supports, which can help you to ensure that OAuth 2.0 overview before getting started. Note: If you are new to OAuth 2.0, we recommend that you read the
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |