Chapter 9. Security Considerations
Up until this point in the book, we have examined the OAuth 2.0 protocol in depth. We have looked at why it is important, where it is used, and how it operates. We have then used this knowledge to implement our own OAuth 2.0 client that interacts with Facebook.
In this chapter, we cover a very important topic: security. We will discuss some security best practices as well as look at some common attacks that you will want to be aware of when creating your own client application. But, before we do, in order to get an accurate idea of the importance of a secure client application that utilizes OAuth 2.0, let's discuss what is at stake.