A common complaint about OAuth is that it is very difficult to understand, but perhaps some of that confusion is because of an expectation that the abstraction provided by a third-party library will erase the need to understand the steps of an OAuth transaction â it does not. This two-part article demonstrates how how OAuth v1 works by explaining the process of connecting a PHP application to the Twitter API using only a few built-in functions to post a message to a userâs Twitter stream. The example code provided in this article is intended for educational purposes only. It lacks much practical use and error handling, Any real development should take advantage of an existing OAuth library, but after reading this article youâll have a better understanding of how OAuth works and will be better equipped to troubleshoot any problems that may arise.
Improving products to stay ahead of competition is the norm. Developing a product that changes the game for your industry is rare. How did leveraging a cloud infrastructure enable Thomson Reuters to alter the legal research process so that customers report getting teary eyed? Read their story at