How to implement OAuth on linux

Posted on 2016-10-20
Medium Priority
Last Modified: 2016-11-12
How to implement OAuth on linux server ?
Question by:Jose Bredariol
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
LVL 40

Expert Comment

ID: 41854195
What OAuth are you looking for?  Single signon for Linux OS? as intermediate webservices? oauth-Server, oauth-Client?

Author Comment

by:Jose Bredariol
ID: 41854252
I´m looking for autentication on my webserver using  IOS/Android App.
LVL 40

Expert Comment

ID: 41854524
Ok, so you need a service library that can refer the user to the googleplex/apple oauth and receive tokens etc. from there (googleplex/apple) after the user authenticates.

And for what programming language, ie. what is your web service written with. (php, nodejs, java, perl, python, ruby)?
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.


Author Comment

by:Jose Bredariol
ID: 41855145
I'm using PHP
LVL 40

Accepted Solution

noci earned 2000 total points (awarded by participants)
ID: 41855696
May i suggest you look into this library:
LVL 40

Expert Comment

ID: 41884544
Best fit i can tell from the info provided, some feedback would have been nice

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Suggested Courses
Course of the Month11 days, 12 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question