White Papers
Table of contents
Introduction to Delegated Authorization .................................................................................................................................. 3
Limitations with the legacy architecture .................................................................................................................................. 3
Key terms for Delegated Authorization ................................................................................................................................... 4
Solution Overview ................................................................................................................................................................... 4
Summary/Conclusion .............................................................................................................................................................. 6