In principle, it's right, though confused, to describe a little bit. It's easier.Other matters:No, not like that. Difference of rights.For authorization, it's not usually a big one than "poss to get a user name." In the authentication dialogue, the user sees all the rights that he requires, and if he does not, he may refuse. Well, at the API level, there are usually no critical actions. Let's say the password or e-mail of the user on access totoken is virtually nowhere to be changed.Yes, very desirable. Well, most of the services don't even let us work through an uncoded connection.However, in the case of explict-authorization, except between the service and your server, access-texane is not being transferred anywhere. So if you use an uncoded connection, only your host can intercept the token or your host. Which, however, could potentially be unpleasant.It's common to do differently, by requesting new access, using static refresher and old access token. The user doesn't see anything, but access to the currents are constantly being replaced by new ones. Someone's doing this once a day, and someone's got a couple hours. Compromised toxins are naturally invalid.If a request is received with an incorrect combination of refresh-tocken and access-tocken, the service shall automatically render both currents invalid, and accordingly the user will see the annex authentication window again.But it's if the service even gives you refreshments. Regrettably, they're opportune, and they don't give them out in Connecticut, different from Google and Facebook. In this case, it is only possible to request from time to time something available to your annex. After the expiry of the current period, the service will be issued in response to a mistake of 400 with error=invalid_grant - in which case the application shall re-export the user to the service application authentication form to obtain a new access current.Yeah, well. That's what a lot of people do. By the way, copying has been working on most sites since the Internet was established. Login-couple is transferred to the service only once, some token (e.g., heh, anything) is returned, it is retained in storage (e.g. cookies), and the token itself is used for copying in the next time. Presided emails and passwords for such a token are not allowed to change.Not only. The main purpose of the application registration is to enable the Administration to disable all the annex of the developer in connection with the implementation of the annex of any harmful actions or in the case of a mass compromising of the users of the annex. No, not on the application server. The application server simply sends a refresher service and gets a new access-token.