Nothing very fancy is required, but the bare minimum to explain the need for authorization, the scopes being used and the "state machine" involved (at least on desktop) during the flow.
Error management should also be part of this (if user refuses the authorization, or a network issue happens).
Nothing very fancy is required, but the bare minimum to explain the need for authorization, the scopes being used and the "state machine" involved (at least on desktop) during the flow.
Error management should also be part of this (if user refuses the authorization, or a network issue happens).