Summary
In this chapter, we explored the various options for refreshing an access token. We looked at refreshing an access token using the preferred refresh token flow. We also looked at the always-available fallback plan of starting the entire auth process over again. Both of these achieve the same result (getting a new, valid access token), but with varying degrees of user interaction. Finally, we ended with a flow chart that models an ideal workflow for gaining and using access tokens, which minimizes user interaction.
This chapter concludes the part of the book in which we examine the different OAuth 2.0 flows and capabilities. In the next chapter, and continuing until the end of the book, we will be looking at the finer details of OAuth 2.0 to give you a more advanced understanding of the protocol and how to utilize it in the most effective and secure manner.