OAuth 2.0 (RFC 6749) is a delegated-authorization standard: app A gains the right to act on behalf of a user in service B without receiving the user's password. Don't confuse with authentication — "sign in with Google" uses OpenID Connect on top of OAuth 2.0. Core flows: Authorization Code (web), PKCE (mobile/SPA), Client Credentials (service-to-service), Device (TV, CLI).
Below: details, example, related terms, FAQ.
Authorization: Bearer eyJhbGciOi...The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeOAuth 2.0 is authorization (what). OpenID Connect is a layer on top for authentication (who) via an id_token (JWT).
No — since OAuth 2.1 draft (2019) and most guides mark it deprecated. Replacement: Authorization Code + PKCE.
Can be, not required. The OAuth spec does not mandate format. Many providers (Google, Auth0) return JWTs for client convenience.