There is an article I cam across on HN, one or two years ago where at the author went into detail on numerous api security authentication and authorization implementation protocols, his experience with each, their faults and his advise when each should best be used. If I remember correctly, he had just finished a big…