Resources
Below is a list of resources which were used to write these notes.
Really great and verbose resource detailing the underlying workings of OAuth as well as diving into vulnerabilities and extensions. At the time these notes were written, the book is 5 years old however the information is still very relevant and up-to-date.
Last updated