Protecting Your APIs with OAuth
Offered By: Okta via YouTube
Course Description
Overview
Discover how to secure API access using OAuth 2.0 and avoid common API security pitfalls in this 59-minute webinar. Explore various OAuth flows, including the Authorization Code Flow, and understand the intricacies of access tokens, JSON Web Tokens, and token lifetimes. Delve into different token types, browser-based applications, password grants, and Rich Authorization Requests. Learn about the importance of the state parameter and gain insights from the OAuth 2.0 Simplified book. Access additional resources, including community websites, videos, and best practices for OAuth implementation. Presented by Okta, this webinar offers valuable knowledge for developers looking to enhance API security and user account management in web and mobile applications.
Syllabus
Intro
Who am I
Common pattern
The original problem
Why OAuth is confusing
OAuth Flows
Authorization Code Flow
Access Tokens
JSON Web Tokens
Token Lifetime
Different Types of Tokens
BrowserBased Apps
Password Grant
Rich Authorization Requests
Questions
State Parameter
OAuth 2 Simplified Book
Taught by
Okta
Related Courses
Server-side Development with NodeJSThe Hong Kong University of Science and Technology via Coursera API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera Authentication and Authorization using Node.js
Microsoft via edX Legacy - Node: De cero a experto
Udemy Effective Oauth2 with Spring Security and Spring Boot
Pluralsight