Главная
Study mode:
on
1
Introduction
2
Context
3
Things that can go wrong
4
Twitter
5
The moral of the story
6
Pixie
7
What pixie does
8
Slow diagram
9
Stolen access tokens
10
Facebook security update
11
The 3 bugs
12
How did this happen
13
How do you fix this
14
Not giving complete trust
15
JWT
16
What happened
17
JSON Web Token
18
Moral of the Story
19
Phishing Email
20
OAuth Prompt
21
Google OAuth Consent
22
Wonderlist OAuth Consent
23
Flickr OAuth Consent
24
Spotify OAuth Consent
25
GitHub OAuth Consent
26
Facebook OAuth Consent
27
Prototype OAuth
28
Identify the service
29
Educate users
Description:
Explore common security threats and protective measures when building microservices using OAuth in this informative conference talk. Delve into high-profile API security breaches related to OAuth, examining implementation patterns for mobile apps, browser-based apps, and web server apps. Learn about the latest best practices in OAuth security being developed by the IETF OAuth working group. Discover insights on stolen access tokens, JSON Web Tokens, phishing emails, and OAuth prompts from various popular services. Gain valuable knowledge on identifying services and educating users to enhance overall security in OAuth implementations.

OAuth - When Things Go Wrong

Okta
Add to list