...
Each of the following subsections describes a process, defined by the OAuth 2 specification, that a client can use to obtain an access token. Once a client has an access token it can make requests to a resource server to obtain access to protected resources.
Authorization Code GrantÂ
Anchor | ||||
---|---|---|---|---|
|
...
See: https://tools.ietf.org/html/rfc6749#section-4.1
...