Authentication With OAuth 2.0 For Trusted Mobile Applications
One of the arguments against OAuth 2.0 is that it ignores mobile applications. While it's true that the standard is heavily tailored for 3rd-party clients, it does offer the Resource Owner Password Credentials Grant. This workflow is a good fit for trusted mobile apps. For example a...