Summary: There was a need to implement a cost-effective software solution to protect APIs and web applications so that only properly authenticated and authorized applications can access these resources. The solution was derived from an implementation of the OAuth 2.0 specification.