Hi Morten,
That's brilliant thank you. Sorry for the short question I was writing it on
my phone :)
I'm back on my pc now.
I have a further question about your unfinished guide, does the table
structure you detail match the current version of OAuth? As I was going to
lift your table structure
The specification does not guide or limit the provider in implementing their
own security policies and that includes the lifetime of tokens. Some
providers may limit it intentionally to let users re-confirm that they still
want to provide the access (or simply users should be logged on to their