12. Security

Previous

This chapter shows how to address common security needs such as authentication, authorization, delegation etc.

  1. How to Use Basic Authentication to Authenticate Clients
  2. How to Use Digest Authentication to Authenticate Clients
  3. How to Use Three-Legged OAuth
  4. How to Use Two-Legged OAuth
  5. How to Deal with Sensitive Information in URIs
  6. How to Maintain Confidentiality and Integrity of Representations

Leave a Comment