This is basically the well-known OAuth protocol using (1) / framework (2). Despite the fact that it should be a standard, each of them had different implementations of this protocol / structure. Therefore, we must be very careful when it comes to integration.
Example: Dropbox still uses OAuth 1 and has recently started supporting OAuth 2.
Back to the answer. As stated in peterpan, its token-based authentication is a one-time thing and out of the equation. These tokens have expired, or in some cases, the authority is granted to the developer.
The interesting thing is that you can determine the scope of access to resources, and not allow the client application to save user names, dangerous passwords.
This is a basic illustration of how this works.

I will update the answer after receiving more details about this, since I am working in this area these days :)
diyoda_ Dec 23 '14 at 20:14 2014-12-23 20:14
source share