Skip to end of metadata
Go to start of metadata
You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
Version 1
Next »
Terms
Overview
Step 1: Introduction of Host and AM
Step 2: Requester obtains Access Token from AM for Host
Step 3: Requester accesses Protected Resource on Host