In this chapter, the key words were security, permissions, and authentication. We learned about:
How Facebook restricts us from accessing information we're not supposed to
How users determine which information other users (and apps) can see
How apps can request permission to see more information from users
How users and apps work together to authenticate with Facebook
Key takeaways
The Graph API will only give certain details about a person if you try to access a Graph Object without proof of authentication.
An access token is proof of authorization, and is associated with both a user and an application.
Users have two credentials: e-mail address and password.
Applications have three credentials: application ID (which is like a username), application secret (which is like a password, and can be changed), and API key (which is used to access the Graph API).
The application credentials are passed to Facebook through a Graph URL, while the user submits their credentials through a standard Facebook...