Corp.’s development team has implemented an OAuth integration with Google. The internal development team has written their own libraries for the company’s OAuth endpoint and has implemented their server via HTTP between Example Corp.’s servers.
1. What security issues would you identify with this design, and what fixes would you recommend?
2. Prepare a proposed Architecture (Schematic) Diagram based on the above to show your outlined solution.