OAuth 2.0 - It's the Implementation, Stupid
Offered By: YouTube
Course Description
Overview
Explore the intricacies of OAuth 2.0 implementation in this 50-minute conference talk from GrrCON 2014. Delve into key concepts, including introductions, terminology, roles, OAuth elements, grant types, and client types. Learn about the Authorization Code Grant and Implicit Grant processes. Gain important insights and understand the risks associated with Authorization Code Replay. This comprehensive presentation provides a deep dive into the practical aspects of OAuth 2.0, emphasizing the critical role of proper implementation in securing authentication and authorization processes.
Syllabus
Intro
INTRODUCTIONS
INTRODUCTION TO OAUTH 2.0
TERMINOLOGY - ROLES
TERMINOLOGY - OAUTH ELEMENTS
TERMINOLOGY - GRANT & CLIENT TYPES
AUTHORIZATION CODE GRANT
IMPLICIT GRANT
IMPORTANT NOTES
AUTHORIZATION CODE REPLAY
Related Courses
Authentication & Authorization: OAuthUdacity Networking and Security in iOS Applications
University of California, Irvine via Coursera AWS Lambda & Serverless Architecture Bootcamp (Build 5 Apps)
Udemy Learn OAuth 2.0 - Get started as an API Security Expert
Udemy Cloud Developer using Microsoft Azure
Microsoft via Udacity