Enables third-party limited access to user resources without revealing credentials by issuing access tokens after user authentication.1
Enables third-party limited access to user resources without revealing credentials by issuing access tokens after user authentication.1