{"version":"1.0","provider_name":"InnovationM - Blog","provider_url":"https:\/\/www.innovationm.com\/blog","author_name":"InnovationM Admin","author_url":"https:\/\/www.innovationm.com\/blog\/author\/innovationmadmin\/","title":"OpenID connect Authentication with OAuth2.0 Authorization - InnovationM - Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"sJ80z27UCX\"><a href=\"https:\/\/www.innovationm.com\/blog\/openid-connect-authentication-with-oauth2-0-authorization\/\">OpenID connect Authentication with OAuth2.0 Authorization<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.innovationm.com\/blog\/openid-connect-authentication-with-oauth2-0-authorization\/embed\/#?secret=sJ80z27UCX\" width=\"600\" height=\"338\" title=\"&#8220;OpenID connect Authentication with OAuth2.0 Authorization&#8221; &#8212; InnovationM - Blog\" data-secret=\"sJ80z27UCX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.innovationm.com\/blog\/wp-content\/uploads\/2019\/07\/OAuth2-Authorization.png","thumbnail_width":1141,"thumbnail_height":634,"description":"In the previous decade, Open Authorization (OAuth) has emerged as an industry-standard protocol for authorization. Today, almost, every web application, mobile application uses OAuth 2.0(latest version of OAuth) for Authorization. According to Wikipedia, OAuth 2.0 is an open standard for delegated Authorization. It&#8217;s usually used as a method for Internet users to get their websites [&hellip;]"}