Summary
In this chapter, we were finally able to complete the OAuth 2.0 workflow we've been learning about since the beginning of the book. We were able to utilize the access token we fetched in the previous two chapters to request access to a protected resource on the user's behalf. We examined three ways of doing this, each with their own pros and cons and appropriate scenarios for usage. We should now be able to integrate comfortably with the bulk of OAuth 2.0 service providers!