Chapter 12. Extensions to OAuth 2.0
You finally made it! Welcome to the final chapter of the book. Up until this point, we have discussed all that you need to know to integrate with practically any OAuth 2.0-compliant service provider out there. We examined the protocol, including the process of registration, getting your access token, using your access token, and refreshing your access token. We examined this in the context of an application developer looking to integrate with an OAuth 2.0-compliant service provider via a client-side workflow or server-side workflow, or both. However, OAuth 2.0 has the ability to be extended in various ways, greatly increasing the power and range of applications to which it can be applied.