Valtik Studios
Identity & Access · Term

OAuth 2.0 / 2.1

Authorization framework for delegated access. Letting an application access resources on behalf of a user without the user sharing credentials with the application. OAuth 2.1 (finalized 2026) mandates PKCE, removes implicit and password grants, and tightens redirect URI handling.

Related Terms

More from Identity & Access

Multi-Factor Authentication (MFA)

Authentication requiring two or more independent factors: something you know (password), something you have (device, hardware key), something you are (biometric). Phishing-resistant MFA (FIDO2/WebAuthn, passkeys) is the 2026 standard; SMS MFA is deprecated.

Passkey

A phishing-resistant credential based on FIDO2/WebAuthn standards, stored in a device's secure enclave and authenticated biometrically. Bound to specific origins, so attackers cannot phish passkeys via lookalike sites. Apple, Google, Microsoft, and most major password managers support passkeys.

FIDO2 / WebAuthn

Open authentication standards (FIDO Alliance + W3C) enabling phishing-resistant passwordless authentication via hardware security keys (YubiKey, Google Titan) or device-bound credentials (passkeys). Cryptographically binds authentication to the legitimate origin, defeating phishing.

Single Sign-On (SSO)

Authentication scheme letting users sign in once and access multiple applications without re-authenticating. Enterprise SSO typically uses SAML 2.0 or OIDC (OpenID Connect over OAuth 2.0). Primary identity providers: Okta, Microsoft Entra ID (formerly Azure AD), Google Workspace, Ping Identity.

Zero Trust

Security model where no implicit trust is granted based on network location. Every request is authenticated and authorized per-resource with continuous verification of identity, device, and context. Defined in NIST SP 800-207. ZTNA (Zero Trust Network Access) is the product category that replaces traditional VPNs.

Privileged Access Management (PAM)

Controls and tools for managing privileged accounts (admins, service accounts, break-glass). Includes credential vaulting, session recording, just-in-time elevation, and audit logging. Major vendors: CyberArk, Delinea, BeyondTrust.

Apply this to your environment

Our engagements address concepts like oauth 2.0 / 2.1 in practice — not just definitions, but how the attack patterns apply to your stack and how to remediate.