Главная
Study mode:
on
1
Intro
2
Who am I
3
Common pattern
4
The original problem
5
Why OAuth is confusing
6
OAuth Flows
7
Authorization Code Flow
8
Access Tokens
9
JSON Web Tokens
10
Token Lifetime
11
Different Types of Tokens
12
BrowserBased Apps
13
Password Grant
14
Rich Authorization Requests
15
Questions
16
State Parameter
17
OAuth 2 Simplified Book
Description:
Discover how to secure API access using OAuth 2.0 and avoid common API security pitfalls in this 59-minute webinar. Explore various OAuth flows, including the Authorization Code Flow, and understand the intricacies of access tokens, JSON Web Tokens, and token lifetimes. Delve into different token types, browser-based applications, password grants, and Rich Authorization Requests. Learn about the importance of the state parameter and gain insights from the OAuth 2.0 Simplified book. Access additional resources, including community websites, videos, and best practices for OAuth implementation. Presented by Okta, this webinar offers valuable knowledge for developers looking to enhance API security and user account management in web and mobile applications.

Protecting Your APIs with OAuth

Okta
Add to list
0:00 / 0:00