Dropbox, Inc.
PROXY AUTHORIZATION OF A NETWORK DEVICE

Last updated:

Abstract:

Some methods enable a first device to assist a second device in becoming authenticated with a content management system. The content management system can receive user credentials or an elevated access token from the first device. The content management system can respond to the first device with an access token for use by the second device. Alternatively, the content management system can send the access token directly to the second device. The second device can then use the access token for authenticated communications with the content management system.

Status:
Application
Type:

Utility

Filling date:

11 Dec 2019

Issue date:

16 Apr 2020