YoVDO

OAuth - When Things Go Wrong

Offered By: Okta via YouTube

Tags

Conference Talks Courses OAuth Courses Phishing Courses Microservices Security Courses JWT (JSON Web Tokens) Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common security threats and protective measures when building microservices using OAuth in this informative conference talk. Delve into high-profile API security breaches related to OAuth, examining implementation patterns for mobile apps, browser-based apps, and web server apps. Learn about the latest best practices in OAuth security being developed by the IETF OAuth working group. Discover insights on stolen access tokens, JSON Web Tokens, phishing emails, and OAuth prompts from various popular services. Gain valuable knowledge on identifying services and educating users to enhance overall security in OAuth implementations.

Syllabus

Introduction
Context
Things that can go wrong
Twitter
The moral of the story
Pixie
What pixie does
Slow diagram
Stolen access tokens
Facebook security update
The 3 bugs
How did this happen
How do you fix this
Not giving complete trust
JWT
What happened
JSON Web Token
Moral of the Story
Phishing Email
OAuth Prompt
Google OAuth Consent
Wonderlist OAuth Consent
Flickr OAuth Consent
Spotify OAuth Consent
GitHub OAuth Consent
Facebook OAuth Consent
Prototype OAuth
Identify the service
Educate users


Taught by

Okta

Related Courses

Introduction to Office 365 Development and APIs
Microsoft via edX
Authentication & Authorization: OAuth
Udacity
API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera
Developing APIs with Google Cloud's Apigee API Platform
Google Cloud via Coursera
Python and Flask Bootcamp: Create Websites using Flask!
Udemy