12. Security
This chapter shows how to address common security needs such as authentication, authorization, delegation etc.
- How to Use Basic Authentication to Authenticate Clients
- How to Use Digest Authentication to Authenticate Clients
- How to Use Three-Legged OAuth
- How to Use Two-Legged OAuth
- How to Deal with Sensitive Information in URIs
- How to Maintain Confidentiality and Integrity of Representations