YoVDO

OAuth - When Things Go Wrong

Offered By: Okta via YouTube

Tags

Conference Talks Courses OAuth Courses Phishing Courses Microservices Security Courses JWT (JSON Web Tokens) Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore common security threats and protective measures when building microservices using OAuth in this informative conference talk. Delve into high-profile API security breaches related to OAuth, examining implementation patterns for mobile apps, browser-based apps, and web server apps. Learn about the latest best practices in OAuth security being developed by the IETF OAuth working group. Discover insights on stolen access tokens, JSON Web Tokens, phishing emails, and OAuth prompts from various popular services. Gain valuable knowledge on identifying services and educating users to enhance overall security in OAuth implementations.

Syllabus

Introduction
Context
Things that can go wrong
Twitter
The moral of the story
Pixie
What pixie does
Slow diagram
Stolen access tokens
Facebook security update
The 3 bugs
How did this happen
How do you fix this
Not giving complete trust
JWT
What happened
JSON Web Token
Moral of the Story
Phishing Email
OAuth Prompt
Google OAuth Consent
Wonderlist OAuth Consent
Flickr OAuth Consent
Spotify OAuth Consent
GitHub OAuth Consent
Facebook OAuth Consent
Prototype OAuth
Identify the service
Educate users


Taught by

Okta

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube