Skip to content

Instantly share code, notes, and snippets.

View prashant2796's full-sized avatar

Prashanth Pandey prashant2796

View GitHub Profile
What is Oauth?
OAuth is basically an authorization framework that is commonly used as a way for internet users to grant websites or applications to access to their information on other websites.
Basically, it delegates authorization process to other application to make sure about user's identity.
Consider, there is an end user, an application A(which is client i.e your website) and Application 2(resource server i.e google,facebook etc).The user who is using application A wants to login into application A through google.Insist of user sharing email and password of google with application A, the application A will redirect the user to gmail website where the user will login and authorize application A to have access to its information on google without sharing his/her password.
Oauth workflow:
1)Server-Side flow(Explicit flow):
@prashant2796
prashant2796 / Database schema.txt
Last active October 28, 2019 21:51
Database Schema Description
Database is consider as backbone of any computer application or software. A relational database organizes data in tables (or relations) The Structural view of relations and attributes(columns) and their relationships with other relations helps to understand dataflow between relations.
A well-designed database shall eliminate Data Redundancy: the same piece of data shall not be stored in more than one place. This is because duplicate data not only waste storage spaces but also easily lead to inconsistencies.Also well-designed database ensures Data Integrity and Accuracy.
In order to attain data integrity and consistency, there are some requirements and design process that are needed to be followed while designing a database schema. The fact is most people are concerned with "defining attributes for their relation" rather than finding how this attributes relate with other atrributes in the relation.Avoiding such requirements and process can deeply affect the database design.
The requirements listed below infl