Главная
Study mode:
on
1
Introduction
2
Agenda
3
Common requirements
4
Architecture diagram
5
Application types
6
Questions to ask
7
What are clients
8
What are resources
9
First iteration
10
Identity
11
External Systems
12
Protocol Flows
13
Identity Token
14
Session Management
15
Resource Access
16
Keep it Simple
17
Access Tokens
18
Access Token Revocation
19
Selfcontained vs reference tokens
20
Summary
Description:
Explore common patterns and challenges in implementing OpenID Connect and OAuth 2.0 for modern application architectures in this comprehensive conference talk. Gain insights into designing token-based systems, selecting appropriate protocol flows, and addressing key considerations such as resource and token design, client integration, session management, and revocation. Learn about identity tokens, access tokens, and the differences between self-contained and reference tokens. Discover practical tips for navigating authentication and authorization in microservices and cloud-native applications, and understand how to effectively implement these protocols to enable secure and scalable identity and access control solutions.

Implementing OpenID Connect and OAuth 2.0 – Tips from the Trenches

NDC Conferences
Add to list