Skip to main content
NEW: RSAC 2026 NHI Field Report. How Non-Human Identity became cybersecurity's central axis
Authentication protocols

What is OAuth?

Also known as: OAuth 2.0

A delegation protocol that lets a user grant a third-party app access to their data without sharing the password. The tokens OAuth issues (access tokens, refresh tokens) are themselves NHIs and need rotation, scope review, and detection when leaked.

Browse the full glossary

25 terms organized by category.