Usernames, passwords, and other information private.įor example, an application can use OAuth 2.0 to obtain permission from OAuth 2.0 allows users to share specific data with an application while keeping their This document explains how applications installed on devices like phones, tablets, andĬomputers use Google's OAuth 2.0 endpoints to authorize access to You've selected the right flow for your application. Overview summarizes OAuth 2.0 flows that Google supports, which can help you to ensure that
OAuth 2.0 overview before getting started. Note: If you are new to OAuth 2.0, we recommend that you read the