Главная
Study mode:
on
1
Intro
2
OAuth vs OAuth Exchange
3
OAuth for First Party Apps
4
How OAuth Works
5
Authorization Code Flow
6
Example
7
Auth Flow
8
Pixie
9
OAuth Worm
10
Access Tokens
11
Drawbacks of Access Tokens
12
SelfEncoded Tokens
13
JSON Web Token
14
Is that enough
15
Token Validation Example
16
Token Validation Flexibility
Description:
Learn how to secure APIs using OAuth 2.0 in this 32-minute conference talk. Explore the OAuth authorization protocol, enabling applications to access user data without credentials. Discover the use of JWT access tokens, their tradeoffs, and how to design granular scopes for backend services. Gain insights into creating a microservices architecture protected by OAuth at the gateway level. Access additional resources, including the speaker's book "OAuth 2.0 Simplified" and Okta's developer services for user account management in web and mobile applications.

Securing Your APIs with OAuth 2.0

Okta
Add to list
0:00 / 0:00