To provide third party applications to restricted resources, resource owner shares his credentials with third party application. This is not safe and might create several problems.
All these problems are solved by using OAuth. It uses authorization layer and separates the role of client from the resource owner.
Client requests access to the protected resources with resource owner grant by using access token.
Access tokens are issued to third party applications by an authorization server.
all the technology issues posted here
ReplyDeletehttp://www.mobengineers.com/2017/01/cors-is-if-your-trying-to-access-from.html