![exchange online client access rules exchange online client access rules](https://images.slideplayer.com/36/10623878/slides/slide_8.jpg)
Actually, several of them used OAuth based authentication from the day they were born. More specifically service providers like Amazon, Facebook, LinkedIn, Google, Instagram, Foursquare, Twitter, DropBox and PayPal use OAuth and most of them have done so for many years. OAuth is used by most of the largest and popular service providers both in the consumer and enterprise space nowadays. OAuth (Open Authentication) is an open authorization standard that was born back in November 2006, so it is by no means a new standard. For those that are not familiar with OAuth, let me give you a short explanation. Over the last couple of years, the respective teams at Microsoft have worked on moving their cloud services (including the Office 365 workloads) to an OAuth based authentication model. Modern Authentication, ADAL and OAuth – What is it? We talked about the two major pain points seen from the end user/client perspective.
#Exchange online client access rules series#
In part 4 of this article series revolving around the available identity models and the authentication story for Exchange Online, our focus was on the Exchange Online authentication story as it was in the past up until now. Exchange Online Identity Models and Authentication Demystified (Part 7).Exchange Online Identity Models and Authentication Demystified (Part 6).Exchange Online Identity Models and Authentication Demystified (Part 4).
![exchange online client access rules exchange online client access rules](http://www.dataenter.com/screen/xwall-install/exchange-access.jpg)
Exchange Online Identity Models and Authentication Demystified (Part 3).
![exchange online client access rules exchange online client access rules](https://www.hkex.com.hk/-/media/HKEX-Market/Services/Trading/Derivatives/Infrastructure/HKATS/HKAASimage.png)
Exchange Online Identity Models and Authentication Demystified (Part 2).Exchange Online Identity Models and Authentication Demystified (Part 1).If you would like to read the other parts in this article series please go to: