YoVDO

OAuth - When Things Go Wrong

Offered By: Okta via YouTube

Tags

Conference Talks Courses OAuth Courses Phishing Courses Microservices Security Courses JWT (JSON Web Tokens) Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common security threats and protective measures when building microservices using OAuth in this informative conference talk. Delve into high-profile API security breaches related to OAuth, examining implementation patterns for mobile apps, browser-based apps, and web server apps. Learn about the latest best practices in OAuth security being developed by the IETF OAuth working group. Discover insights on stolen access tokens, JSON Web Tokens, phishing emails, and OAuth prompts from various popular services. Gain valuable knowledge on identifying services and educating users to enhance overall security in OAuth implementations.

Syllabus

Introduction
Context
Things that can go wrong
Twitter
The moral of the story
Pixie
What pixie does
Slow diagram
Stolen access tokens
Facebook security update
The 3 bugs
How did this happen
How do you fix this
Not giving complete trust
JWT
What happened
JSON Web Token
Moral of the Story
Phishing Email
OAuth Prompt
Google OAuth Consent
Wonderlist OAuth Consent
Flickr OAuth Consent
Spotify OAuth Consent
GitHub OAuth Consent
Facebook OAuth Consent
Prototype OAuth
Identify the service
Educate users


Taught by

Okta

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
Offensive Security Engineering
Udemy
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn