Use caution with OAuth 2.0 protocol for enterprise logins
The reason why authentication specifications, such as the OAuth 2.0 protocol, are such a vital information security control for maintaining secure logins is because it’s the first step in the process of authorization, allowing access rights to be granted based on who a user is. Authentication confirms the identity of someone, or something, while authorization occurs after successful authentication; it grants or denies read, write and execute permissions on system resources.
Read more at – Use caution with OAuth 2.0 protocol for enterprise logins