+--------+ +---------------+
| |--(A)- Authorization Request ->| Resource |
| | | Owner |
| |<-(B)-- Authorization Grant ---| |
| | +---------------+
| |
| | +---------------+
| |--(C)-- Authorization Grant -->| Authorization |
| Client | | Server |
| |<-(D)----- Access Token -------| |
| | +---------------+
| |
| | +---------------+
| |--(E)----- Access Token ------>| Resource |
| | | Server |
| |<-(F)--- Protected Resource ---| |
+--------+ +---------------+
The interaction between the four roles and includes the following steps:
The preferred method for the client to obtain an Authorization Grant from the Resource Owner (depicted in steps (A) and (B)) is to use the Authorization Server as an intermediary.
- based on data observed:2015-05-18