YoVDO

Protecting Your APIs with OAuth

Offered By: Okta via YouTube

Tags

OAuth Courses OAuth 2.0 Courses JSON Web Tokens Courses API Security Courses Access Tokens Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how to secure API access using OAuth 2.0 and avoid common API security pitfalls in this 59-minute webinar. Explore various OAuth flows, including the Authorization Code Flow, and understand the intricacies of access tokens, JSON Web Tokens, and token lifetimes. Delve into different token types, browser-based applications, password grants, and Rich Authorization Requests. Learn about the importance of the state parameter and gain insights from the OAuth 2.0 Simplified book. Access additional resources, including community websites, videos, and best practices for OAuth implementation. Presented by Okta, this webinar offers valuable knowledge for developers looking to enhance API security and user account management in web and mobile applications.

Syllabus

Intro
Who am I
Common pattern
The original problem
Why OAuth is confusing
OAuth Flows
Authorization Code Flow
Access Tokens
JSON Web Tokens
Token Lifetime
Different Types of Tokens
BrowserBased Apps
Password Grant
Rich Authorization Requests
Questions
State Parameter
OAuth 2 Simplified Book


Taught by

Okta

Related Courses

Designing RESTful APIs
Udacity
API Design and Fundamentals of Google Cloud's Apigee API Platform
Google Cloud via Coursera
API Development on Google Cloud's Apigee API Platform
Google Cloud via Coursera
API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera
Developing APIs with Google Cloud's Apigee API Platform
Google Cloud via Coursera