Summary
In this chapter, we have taken a dedicated look at special considerations for integrating with OAuth 2.0 service providers via native mobile applications. We explored the appropriate flow to use from native mobile applications, as well as alternatives that make use of certain platforms' capabilities. There are very important, but subtle, security implications that are important for developers to be aware of. We then discussed how to leverage both workflows in a hybrid architecture to maximize performance and security. Finally, we looked at special provisions that are allowed to mobile application developers integrating with certain major service providers. In the next chapter, we will look at how to troubleshoot your OAuth 2.0 application in an effective and efficient manner.