Confidential applications can securely store credentials and are typically server-side applications, while public applications cannot securely store credentials and are often client-side apps, such as mobile or desktop applications. Confidential applications can secure credentials and perform robust authentication.
OAuth defines two types of clients: confidential clients and public clients. Confidential clients are applications that are able to securely authenticate with the authorization server, for example being able to keep their registered client secret safe.
A web app is the most common confidential client. The client ID is exposed through the web browser, but the secret is passed only through the backend and is never directly exposed. Public client applications are apps that run on consumer devices, desktop computers, or in a web browser.
In summary, avoid stating ``company confidential'' on your resume and instead highlight your qualifications in a way that respects confidentiality while still demonstrating your capabilities.
A Confidential Application can be used to issue OAuth 2.0 which is used to authenticate to various OCI Services. This is especially useful for Oracle Cloud Analytics (OAC) when automating Snapshot Management. You can provision a confidential application using the OCI CLI or by using the Python SDK.
A confidential resume is an acceptable way in which to maintain your privacy while showcasing your value to potential employers. For the most part, employers understand this need for privacy, particularly in cases where candidates wish to keep their job search discreet while they are currently employed.
Suggest you sanitize the name by giving a generic description (e.g. major mutli-national defense manufacturer, leading European beverage company). In terms of specifics of a project experience it's similar → can just describe the nature of the work you did, rather than giving exact work descriptions + real numbers.
These are considered confidential applications: A web application with a secure backend that uses the Authorization Code Flow, Resource Owner Password Flow, or Resource Owner Password Flow with realm support. A machine-to-machine (M2M) application that uses the Client Credentials Flow.