IBM Security Access Manager for Mobile supports the OAuth 2.0 protocol. The implementation of OAuth 2.0 in Security Access Manager for Mobile strictly follows the OAuth 2.0 standards.
OAuth is an HTTP-based authorization protocol. It gives third-party applications scoped access to a protected resource on behalf of the resource owner. It gives scoped access by creating an approval interaction between the resource owner, client, and the resource server. It gives users the ability to share their private resources between sites without providing user names and passwords. Private resources can be anything, but common examples include photos, videos, and contact lists.
For a complete description of the OAuth 2.0 specifications, see the OAuth websitehttp://www.oauth.net.
The OAuth 2.0 implementation of Security Access Manager for Mobile also integrates with WebSphere DataPower. For more information, see DataPower Integration.