Protecting Your APIs with OAuth
Offered By: Okta via YouTube
Course Description
Overview
Discover how to secure API access using OAuth 2.0 and avoid common API security pitfalls in this 59-minute webinar. Explore various OAuth flows, including the Authorization Code Flow, and understand the intricacies of access tokens, JSON Web Tokens, and token lifetimes. Delve into different token types, browser-based applications, password grants, and Rich Authorization Requests. Learn about the importance of the state parameter and gain insights from the OAuth 2.0 Simplified book. Access additional resources, including community websites, videos, and best practices for OAuth implementation. Presented by Okta, this webinar offers valuable knowledge for developers looking to enhance API security and user account management in web and mobile applications.
Syllabus
Intro
Who am I
Common pattern
The original problem
Why OAuth is confusing
OAuth Flows
Authorization Code Flow
Access Tokens
JSON Web Tokens
Token Lifetime
Different Types of Tokens
BrowserBased Apps
Password Grant
Rich Authorization Requests
Questions
State Parameter
OAuth 2 Simplified Book
Taught by
Okta
Related Courses
Designing RESTful APIsUdacity API Design and Fundamentals of Google Cloud's Apigee API Platform
Google Cloud via Coursera API Development on Google Cloud's Apigee API Platform
Google Cloud via Coursera API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera Developing APIs with Google Cloud's Apigee API Platform
Google Cloud via Coursera