exam questions

Exam DEA-1TT4 All Questions

View all questions & answers for the DEA-1TT4 exam

Exam DEA-1TT4 topic 1 question 47 discussion

Actual exam question from Dell's DEA-1TT4
Question #: 47
Topic #: 1
[All DEA-1TT4 Questions]

DRAG DROP -
If the client requests authorization from the resource owner, what are the remaining sequence of steps to authenticate a user using OAuth control?
Select and Place:

Show Suggested Answer Hide Answer
Suggested Answer:
Reference:
https://tools.ietf.org/html/rfc6749

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
shaolong1231
Highly Voted 3 years, 8 months ago
correct : STEP1 : Client receives an authorization grand used by the client to obtain an access token STEP2 : client requests an access token by authenticating with the authorization server and presenting the authorization grant STEP3 : authorization server authenticates the client and validates the authorization grant STEP4 : client requests the protected resource from the resource server and authenticates by presenting the access token STEP5 : resource server validates the access token and if valid serves the request https://tools.ietf.org/html/rfc6749#section-7 P7
upvoted 10 times
...
marmaris
Highly Voted 3 years, 11 months ago
Wrong Client requests an authorization grand used by the client to obtain an access token Client requests an access token by authenticating with the authorization server and presents the auth. Grand Authorization server authenticates the client and validates the authorization grant Client requests the protected resource from the res. Server and authenticates by pres. The access token. 6 Resource server validates the access token and serves the request.
upvoted 8 times
...
Saroj1969
Most Recent 2 years, 6 months ago
ans is not correct
upvoted 1 times
...
Maryjn3
2 years, 11 months ago
CLIENT REQUESTS AN ACCESS TOKEN BY AUTHENTICATING WITH THE AUTHORIZATION SERVER AND PRESENTS THE AUTHORIZATION GRANT CLIENT RECEIVES AN AUTHORIZATION GRANT USED BY THE CLIENT TO OBTAIN AN ACCESS TOKEN AUTHORIZATION SERVER AUTHENTICATES THE CLIENT AND VALIDATES THE AUTHORIZATION GRANT CLIENT REQUESTS THE PROTECTED RESOURCE FROM THER RESOURCE SERVER AND AUTHENTICATES BY PRESENTING THE ACCESS TOKEN RESOURCE SERVER VALIDATES THE ACCESS TOKEN AND, IF VALID, SERVES THE REQUEST
upvoted 1 times
...
David_Le
3 years ago
STEP 1: client receives an authorization grand used by the client to obtain an access token STEP 2: client requests an access token by authenticating with the authorization server and presenting the authorization grant STEP 3: authorization server authenticates the client and validates the authorization grant STEP 4: client requests the protected resource from the resource server and authenticates by presenting the access token STEP 5: resource server validates the access token and if valid serves the request
upvoted 1 times
...
dioamm
3 years, 1 month ago
ISMv4: 1. The client requests authorization from the resource owner. The authorization request can be made directly to the resource owner, or indirectly through the authorization server. 2. The client receives an authorization grant, which is a credential representing the resource owner's authorization to access its protected resources. It is used by the client to obtain an access token. Access tokens are credentials that are used to access protected resources. An access token is a string representing an authorization issued to the client. The string is usually opaque to the client. Tokens represent specific scopes and durations of access, granted by the resource owner, and enforced by the resource server and authorization server. 3. The client requests an access token by authenticating with the authorization server and presenting the authorization grant. 4. The authorization server authenticates the client and validates the authorization grant, and if valid, issues an access token. 5. The client requests the protected resource from the resource server and authenticates by presenting the access token. 6. The resource server validates the access token, and if valid, serves the request.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago