eCommerce, web & Android app development for Folkestone

Why choose New Media Aid?
Bespoke web app developers, Android app developers and ecommerce website developers for Folkestone, Kent. Our low cost cutting-edge app development team is only 87 miles away from Folkestone. The development cost of a bespoke Android app, web app or ecommerce website for organisations in Kent will usually be between £2,000 and £5,000.

We develop cutting-edge, custom-made, mobile-friendly web apps, e-commerce websites and Android apps for companies in Kent. Web, ecommerce and Android app developers you can trust to deliver modern, mobile-friendly web apps or websites as well as bespoke Android apps and ecommerce solutions only 87 miles from Folkestone.


Useful web app developers term of the day: OAuth2

OAuth2 (Open Authorization 2) is an authorization framework that allows a user to grant a third-party application access to their resources, without giving the application their login credentials. It is used for secure API authentication and authorization.

In OAuth2, the user (resource owner) grants permission to a third-party application (client) to access their resources on a server (resource server). The authorization process involves the following steps:

  1. The client sends a request to the authorization server, asking for permission to access the user's resources.
  2. The user is then redirected to the authorization server to authenticate and authorize the request.
  3. If the user grants permission, the authorization server sends an authorization code back to the client.
  4. The client then exchanges the authorization code for an access token that it can use to access the user's resources from the resource server.

There are four main roles involved in the OAuth2 process: the resource owner, the client, the resource server, and the authorization server. The resource owner is the user who has the resources that the client wants to access. The client is the third-party application that wants to access the user's resources. The resource server is the server that hosts the user's resources. The authorization server is the server that verifies the user's identity and issues access tokens to the client.

OAuth2 is widely used by many web services, such as Google, Facebook, Twitter, and GitHub. It is considered a secure and reliable way to grant third-party applications access to user resources without compromising the user's security.

OAuth2 is an authorization protocol used to grant third-party applications access to user resources, without disclosing the user's credentials. It has become a standard for authenticating users and providing authorization access to resources on the web. OAuth2 works by providing access tokens that represent authorization to access a user's data. This allows third-party applications to access a user's data without requiring the user to share their credentials.

OAuth2 has four main participants: the user, the client, the resource server, and the authorization server. The user is the entity that owns the resource, which is being accessed. The client is the third-party application requesting access to the user's resource. The resource server is the server that hosts the resource that the client is requesting access to. The authorization server is responsible for verifying the identity of the user and generating the access token.

The OAuth2 protocol works in several steps, which are outlined below:

  1. The user initiates the OAuth2 process by accessing the client application. The client application requests access to the user's resource.

  2. The client application directs the user to the authorization server, which will request the user to log in or confirm their identity if they haven’t already. Once the user has provided their credentials, the authorization server verifies their identity.

  3. Once the user's identity is verified, the authorization server issues an access token to the client application.

  4. The client application sends the access token to the resource server to request access to the user's resource.

  5. The resource server verifies the access token's validity with the authorization server, and if the token is valid, the resource server grants the client application access to the user's resource.

  6. Once the client application has been granted access, it can retrieve and manipulate the user's data as long as the access token remains valid.

Access tokens are typically short-lived and will expire after a set period. OAuth2 also provides a refresh token that can be used by the client application to obtain a new access token once the old token expires. This allows the client application to continue accessing the user's resources without requiring the user to re-authenticate every time the access token expires.

OAuth2 is a flexible protocol that supports multiple grant types, which determine the process of obtaining an access token. Some of the commonly used grant types are:

  1. Authorization Code Grant: This grant type is used by client applications that are running on a web server. The authorization server issues an authorization code to the client application, which is then exchanged for an access token.

  2. Implicit Grant: This grant type is used by client applications that are running on a user's web browser. The access token is issued directly to the client application without using an authorization code.

  3. Resource Owner Password Credentials Grant: This grant type is used by client applications that have obtained the user's username and password. The client application exchanges the user's credentials for an access token.

  4. Client Credentials Grant: This grant type is used by client applications that are accessing resources that do not belong to a user, such as an API. The client application uses its own credentials to obtain an access token.

In conclusion, OAuth2 provides a secure and flexible way for third-party applications to access user resources without requiring the user to share their credentials. The protocol uses access tokens and grant types to authenticate users and provide authorization access to resources on the web. OAuth2 has become a standard for authenticating users and providing authorization access to resources on the web, and it is widely used by major companies such as Google, Facebook, and Twitter.



Crimes reported in Folkestone
Our custom app development prices are criminally low, but not as criminal as these events recently reported in Folkestone.

What's with the crime stats?
We thought we would show you some Folkestone crimes reported in Jan 2025 to highlight how external cloud-based API data can be integrated within apps.

bicycle theft
  • Shopping Area (Awaiting court outcome)
burglary
  • Marine Terrace (Under investigation)
  • Downside (Investigation complete; no suspect identified)
  • Parkside (Under investigation)
  • Marine Terrace (Under investigation)
  • Church Street (Unable to prosecute suspect)
criminal damage arson
  • North Street (Investigation complete; no suspect identified)
  • Parking Area (Under investigation)
  • Police Station (Under investigation)
  • Darby Road (Unable to prosecute suspect)
  • Pound Way (Investigation complete; no suspect identified)
drugs
  • Shopping Area (Under investigation)
  • Radnor Park Avenue (Under investigation)
  • Harbour Way (Under investigation)
  • Albion Road (Under investigation)
  • Radnor Park Road (Local resolution)
other theft
  • Parking Area (Investigation complete; no suspect identified)
  • The Leas (Investigation complete; no suspect identified)
  • London Street (Investigation complete; no suspect identified)
  • Cheriton Gardens (Investigation complete; no suspect identified)
  • Clifton Gardens (Investigation complete; no suspect identified)
possession of weapons
  • Shopping Area (Under investigation)
public order
  • Wellfield Road (Investigation complete; no suspect identified)
  • Court Approach (Unable to prosecute suspect)
  • Beachborough Road (Investigation complete; no suspect identified)
  • Parking Area (Under investigation)
  • Marine Terrace (Under investigation)
robbery
  • Beachborough Road (Awaiting court outcome)
  • Victoria Road (Under investigation)
  • Bouverie Place (Under investigation)
  • Lister Way (Under investigation)
shoplifting
  • Parking Area (Awaiting court outcome)
  • Cheriton Place (Under investigation)
  • Parking Area (Awaiting court outcome)
  • Alexandra Gardens (Investigation complete; no suspect identified)
  • Nightclub (Unable to prosecute suspect)
theft from the person
  • Bouverie Place (Under investigation)
  • Guildhall Street (Under investigation)
  • Cheriton Gardens (Under investigation)
vehicle crime
  • Supermarket (Under investigation)
  • Court Approach (Under investigation)
  • Petrol Station (Investigation complete; no suspect identified)
  • Grimston Avenue (Investigation complete; no suspect identified)
  • Christ Church Road (Unable to prosecute suspect)
violent crime
  • Claremont Road (Under investigation)
  • Jesmond Street (Unable to prosecute suspect)
  • Victoria Road (Action to be taken by another organisation)
  • Enbrook Road (Under investigation)
  • Dean Mead (Under investigation)
other crime
  • Sussex Road (Under investigation)
  • Claremont Road (Action to be taken by another organisation)
  • Police Station (Awaiting court outcome)
  • Charlotte Street (Unable to prosecute suspect)
  • Plain Road (Under investigation)
We are only 87 miles from Folkestone
ab@newma.co.uk