{"author_name":"tototoshi","version":"1.0","title":"OAuth\u8a8d\u8a3c+Java\u304b\u3089Twitter\u306b\u30dd\u30b9\u30c8 \u305d\u306e2","type":"rich","blog_title":"tototoshi \u306e\u65e5\u8a18","provider_name":"Hatena Blog","published":"2010-01-08 21:45:33","blog_url":"https://tototoshi.hatenablog.com/","categories":["Twitter","OAuth"],"width":"100%","url":"https://tototoshi.hatenablog.com/entry/20100108/1262954733","height":"190","image_url":null,"author_url":"https://blog.hatena.ne.jp/tototoshi/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftototoshi.hatenablog.com%2Fentry%2F20100108%2F1262954733\" title=\"OAuth\u8a8d\u8a3c+Java\u304b\u3089Twitter\u306b\u30dd\u30b9\u30c8 \u305d\u306e2 - tototoshi \u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","description":"\u3060\u3044\u3076\u9593\u304c\u7a7a\u3044\u305f\u3051\u3069Twitter\u306eOAuth\u8a8d\u8a3c~request_token\u53d6\u5f97\u7de8~ \u4eca\u65e5\u306f\u3068\u308a\u3042\u3048\u305a\u4ed5\u69d8\u3092\u3058\u3063\u304f\u308a\u898b\u3066\u307f\u307e\u3059\u3002 http://oauth.net/core/1.0/ \u2191\u306e\u30da\u30fc\u30b8\u306e6.1\u304crequest_token\u53d6\u5f97\u306e\u90e8\u5206\u3067\u3059\u3002 6.1. Obtaining an Unauthorized Request Token The Consumer obtains an unauthorized Request Token by asking the Service Provider to issue a Token. The Request Token\u2019s sole purpo\u2026"}