Responsible for getting and providing OAuth tokens from Mendeley's server for workers.
Cloud Native Data Security with OAuth: A Scalable Zero Trust ArchitectureCloud Native Data Security with OAuth: A Scalable Zero Trust Architecture (2025)
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (2022)
by Wilson, Yvonne, Hingnikar, Abhishek
Fundamentals of Software Architecture: An Engineering ApproachFundamentals of Software Architecture: An Engineering Approach (2020)
by Richards, Mark, Ford, Neal
Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition)Ultimate Web Authentication Handbook: Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO (English Edition) (2023)
by Dash, Sambit Kumar
Code: The Hidden Language of Computer Hardware and SoftwareCode: The Hidden Language of Computer Hardware and Software (2022)
by Petzold, Charles
Advanced API Security: OAuth 2.0 and BeyondAdvanced API Security: OAuth 2.0 and Beyond (2019)
by Siriwardena, Prabath
The Pragmatic Programmer: Your Journey To Mastery, 20th Anniversary Edition (2nd Edition)The Pragmatic Programmer: Your Journey To Mastery, 20th Anniversary Edition (2nd Edition) (2019)
by Thomas, David, Hunt, Andrew
Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applicationsKeycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications (2023)
by Stian Thorgersen, Pedro Igor Silva
OAuth 2 in ActionOAuth 2 in Action (2017)
by Richer, Justin
OAuth 2.0 ServersOAuth 2.0 Servers (2015)
by Parecki, Aaron
OAuth 2.0: All you need to know (Identity in Cybersecurity)OAuth 2.0: All you need to know (Identity in Cybersecurity) (2025)
by Relington, James
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWEAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE (2014)
by Siriwardena, Prabath
OAuth 2.0: Getting Started in Web-API Security (API University Series)OAuth 2.0: Getting Started in Web-API Security (API University Series) (2015)
by Biehl, Matthias
OAuth 2.0 SimplifiedOAuth 2.0 Simplified (2018)
by Parecki, Aaron
OAuth 2.0: Getting Started in API Security (API-University Series Book 1)OAuth 2.0: Getting Started in API Security (API-University Series Book 1) (2014)
by Biehl, Matthias
Mastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization FrameworkMastering OAuth 2.0: Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework (2015)
by Bihis, Charles
Getting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and AuthenticationGetting Started with OAuth 2.0: Programming Clients for Secure Web API Authorization and Authentication (2012)
by Boyd, Ryan
OAuth 2.0: Learn OAuth in a simple wayOAuth 2.0: Learn OAuth in a simple way (2016)
by Warnock, Dan
OAuth 2.0: Introduction to API Security with OAuth 2.0OAuth 2.0: Introduction to API Security with OAuth 2.0 (2016)
by Moore, Joseph
Clean Code: A Handbook of Agile Software CraftsmanshipClean Code: A Handbook of Agile Software Craftsmanship (2008)
by Robert C. Martin
OAuth 2.0 Identity and Access Management PatternsOAuth 2.0 Identity and Access Management Patterns (2013)
by Spasovski, Martin