Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Investigate possible methods (ways) to implement OAuth2 authorization


Terminologies

...

Protected resource – some data that needs to be accessed, it needs to be secured and only accessible to requests with a valid JWT access token. In our case it’s mod-inn-reach or inn-reach-edge REST endpoints.

...