To realize the distribution of processing load and prompt response, the concept of edge computing is drawing attention. Under the edge computing environment, server processing is carried out on an edge node located near various devices with a communication module instead of on a central server. These edge nodes can be provided by another entity other than service providers such as network operators. The edge nodes have fewer computing resources than a central server has. Therefore, appropriate dynamic resource management is required to avoid resource exhaustion. For this purpose, authorization techniques, e.g., OAuth, can be applied. In this paper, we consider applying the OAuth protocol for a privilege delegation on edge computing. Firstly, we clarify the authentication flows differ depending on the relationship of edge computing players (edge provider, user, service provider). We then describe the unique problems of resource authorization on edge computing.