It may (or should in the case of 1.0a) also contain a verification code which you take note of. When completing this page your request token is basically authorized and can be used in the next step. By using your request token, request token secret and verification code you request an access token.