separate steps to obtain authorization and access tokens • Implicit • browser-based client gets an access token in one step • Resource Owner Password • high trust environment, legacy applications • Client Credentials • based on client rather than resource owner directly