YoVDO

OAuth 2.0 - It's the Implementation, Stupid

Offered By: YouTube

Tags

OAuth 2.0 Courses Web Development Courses Authorization Courses API Security Courses Access Tokens Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of OAuth 2.0 implementation in this 50-minute conference talk from GrrCON 2014. Delve into key concepts, including introductions, terminology, roles, OAuth elements, grant types, and client types. Learn about the Authorization Code Grant and Implicit Grant processes. Gain important insights and understand the risks associated with Authorization Code Replay. This comprehensive presentation provides a deep dive into the practical aspects of OAuth 2.0, emphasizing the critical role of proper implementation in securing authentication and authorization processes.

Syllabus

Intro
INTRODUCTIONS
INTRODUCTION TO OAUTH 2.0
TERMINOLOGY - ROLES
TERMINOLOGY - OAUTH ELEMENTS
TERMINOLOGY - GRANT & CLIENT TYPES
AUTHORIZATION CODE GRANT
IMPLICIT GRANT
IMPORTANT NOTES
AUTHORIZATION CODE REPLAY


Related Courses

How to Protect APIs Using the Microsoft Identity Platform
Microsoft via YouTube
Tokenisation and Encryption in Digital Payments, FinTech
Udemy
Authenticate Users with FastAPI and Token Authentication
Linode via YouTube
JWT Authentication - Persist Login State on Refresh - MERN Stack
Dave Gray via YouTube
React Login Authentication with JWT Access, Refresh Tokens, Cookies and Axios
Dave Gray via YouTube