Chapter 3. Managing user-owned OAuth access tokens