• Primarily designed for insecure communications — mainly non-HTTPS • MITM - man-in-the-middle attack • decoupling of username and password from the access token • HMAC-SHA1 and RSA-SHA1. • Two channels: a front-channel which is used to engage the resource owner and request authorization, and a back-channel used by the client to directly interact with the server.