SlideShare a Scribd company logo
1 of 12
Oauth
Pros and Cons
About
Oauth is widely used open standard protocol for authorization and is used by many
applications to authenticate users and grant access to their resources on other websites
or apps.
Pros: Security
Ensures secure user authentication and protects user data by not sharing user
credentials between different websites or apps.
Pros: Convenience
With OAuth, users don't have to create
multiple accounts across different
websites and apps.
Users can simply use their existing
credentials from one website or app to
log in to another.
Simplifies the login process for users,
as users don't have to remember
multiple usernames and passwords.
Pros: User control
OAuth gives users
greater control
over their data and
which applications
have access to it.
01
Users can revoke
access to their
data at any time.
02
Enhances their
privacy and
security.
03
Pros:Scalability
Can be used by small or large organizations without the need for any additional
infrastructure or resources.
Pros:User-friendly OAuth simplifies the login process
for users, as users don't have to
remember multiple usernames and
passwords.
Cons: Attractive target
Attractive target for attackers.
OAuth tokens can be stolen or intercepted, which
can lead to unauthorized access to user data.
Cons: Complexity
OAuth can be complicated to
implement and requires
developers to have a good
understanding of the protocol
and its specifications
Challenging for smaller
organizations with limited
resources to implement.
Cons: Reliance on third-party services
• OAuth requires the use of third-party services to manage user authentication
• can increase reliance on those services
• create potential security vulnerabilities.
Cons: Limited
control over user
experience:
With OAuth, developers
have limited control over
the user experience, as
they must adhere to the
protocol's specifications
Can limit customization
options for the login
process.
Cons: Potential for user confusion
• OAuth involves the use of pop-up windows or redirects to third-party sites, which can
confuse users and make them more susceptible to phishing attacks.

More Related Content

Similar to OauthProsCons.pptx

Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
Dinesh Kumar
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
eSAT Journals
 

Similar to OauthProsCons.pptx (20)

Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
 
Social Network Intergration
Social Network IntergrationSocial Network Intergration
Social Network Intergration
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Introduction to OAuth2.0
Introduction to OAuth2.0Introduction to OAuth2.0
Introduction to OAuth2.0
 
Oauth 2.0
Oauth 2.0Oauth 2.0
Oauth 2.0
 
Oauth Behind The Scenes
Oauth Behind The Scenes Oauth Behind The Scenes
Oauth Behind The Scenes
 
Oauth
OauthOauth
Oauth
 
Universal login
Universal loginUniversal login
Universal login
 
Introduction to OAuth2
Introduction to OAuth2 Introduction to OAuth2
Introduction to OAuth2
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
 
#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and Mobile
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security ServerFlaws in Oauth 2.0 Can Oauth be used as a Security Server
Flaws in Oauth 2.0 Can Oauth be used as a Security Server
 
Spring Security
Spring SecuritySpring Security
Spring Security
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Secure Webservices
Secure WebservicesSecure Webservices
Secure Webservices
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device ppt
 

More from Nickleus Jimenez (8)

Just One More Compile syndrome_.pdf
Just One More Compile  syndrome_.pdfJust One More Compile  syndrome_.pdf
Just One More Compile syndrome_.pdf
 
Api design tips
Api design tipsApi design tips
Api design tips
 
Unit test ideal characteristics
Unit test ideal characteristicsUnit test ideal characteristics
Unit test ideal characteristics
 
DevSecOps outline
DevSecOps outlineDevSecOps outline
DevSecOps outline
 
Technical debt
Technical debtTechnical debt
Technical debt
 
Architecture patterns overview
Architecture patterns overviewArchitecture patterns overview
Architecture patterns overview
 
Veracrypt on Ubuntu
Veracrypt on UbuntuVeracrypt on Ubuntu
Veracrypt on Ubuntu
 
NickleusJimenez
NickleusJimenezNickleusJimenez
NickleusJimenez
 

Recently uploaded

Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
Max Lee
 

Recently uploaded (20)

Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
The Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion ProductionThe Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion Production
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
What need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java DevelopersWhat need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java Developers
 
AI Hackathon.pptx
AI                        Hackathon.pptxAI                        Hackathon.pptx
AI Hackathon.pptx
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 

OauthProsCons.pptx

  • 2. About Oauth is widely used open standard protocol for authorization and is used by many applications to authenticate users and grant access to their resources on other websites or apps.
  • 3. Pros: Security Ensures secure user authentication and protects user data by not sharing user credentials between different websites or apps.
  • 4. Pros: Convenience With OAuth, users don't have to create multiple accounts across different websites and apps. Users can simply use their existing credentials from one website or app to log in to another. Simplifies the login process for users, as users don't have to remember multiple usernames and passwords.
  • 5. Pros: User control OAuth gives users greater control over their data and which applications have access to it. 01 Users can revoke access to their data at any time. 02 Enhances their privacy and security. 03
  • 6. Pros:Scalability Can be used by small or large organizations without the need for any additional infrastructure or resources.
  • 7. Pros:User-friendly OAuth simplifies the login process for users, as users don't have to remember multiple usernames and passwords.
  • 8. Cons: Attractive target Attractive target for attackers. OAuth tokens can be stolen or intercepted, which can lead to unauthorized access to user data.
  • 9. Cons: Complexity OAuth can be complicated to implement and requires developers to have a good understanding of the protocol and its specifications Challenging for smaller organizations with limited resources to implement.
  • 10. Cons: Reliance on third-party services • OAuth requires the use of third-party services to manage user authentication • can increase reliance on those services • create potential security vulnerabilities.
  • 11. Cons: Limited control over user experience: With OAuth, developers have limited control over the user experience, as they must adhere to the protocol's specifications Can limit customization options for the login process.
  • 12. Cons: Potential for user confusion • OAuth involves the use of pop-up windows or redirects to third-party sites, which can confuse users and make them more susceptible to phishing attacks.