Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай The Nuts and Bolts of OAuth 2.0, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:02:24
    Intro to this Course
  • Урок 2. 00:03:37
    A Brief History of OAuth
  • Урок 3. 00:05:20
    How OAuth Improves Application Security
  • Урок 4. 00:04:20
    OAuth vs OpenID Connect
  • Урок 5. 00:04:47
    Roles in OAuth
  • Урок 6. 00:04:56
    Application Types
  • Урок 7. 00:05:38
    User Consent
  • Урок 8. 00:06:14
    Front Channel vs Back Channel
  • Урок 9. 00:06:55
    Application Identity
  • Урок 10. 00:01:22
    Introduction to OAuth Clients
  • Урок 11. 00:04:17
    Registering an Application
  • Урок 12. 00:11:02
    Authorization Code Flow for Web Applications
  • Урок 13. 00:01:11
    The Unique Issues of Native Apps
  • Урок 14. 00:03:35
    Redirect URLs for Native Apps
  • Урок 15. 00:04:14
    Browser Security for Native Apps
  • Урок 16. 00:09:08
    Authorization Code Flow for Native Apps
  • Урок 17. 00:04:11
    Refresh Tokens for Native Apps
  • Урок 18. 00:04:44
    Problems with the Browser Environment
  • Урок 19. 00:08:39
    Authorization Code Flow for Single-Page Applications
  • Урок 20. 00:05:21
    Protecting Tokens in the Browser
  • Урок 21. 00:02:31
    Securing the Browser with a Backend
  • Урок 22. 00:03:54
    Limitations of IoT and Smarthome Devices
  • Урок 23. 00:04:49
    Device Flow for Browserless Devices
  • Урок 24. 00:02:28
    When to use the Client Credentials Grant
  • Урок 25. 00:02:05
    Client Credentials Grant for Machine-to-Machine Applications
  • Урок 26. 00:03:35
    What is an ID Token
  • Урок 27. 00:02:33
    How ID Tokens are Different from Access Tokens
  • Урок 28. 00:05:25
    Obtaining an ID Token
  • Урок 29. 00:04:30
    Hybrid OpenID Connect Flows
  • Урок 30. 00:06:25
    Validating and Using an ID Token
  • Урок 31. 00:01:18
    Intro to Protecting an API with OAuth
  • Урок 32. 00:03:37
    Reference Tokens vs Self-Encoded Tokens
  • Урок 33. 00:03:53
    Pros and Cons of Reference Tokens
  • Урок 34. 00:04:51
    Pros and Cons of Self-Encoded Tokens
  • Урок 35. 00:05:24
    The Structure of a JWT Access Token
  • Урок 36. 00:04:36
    Remote Token Introspection
  • Урок 37. 00:06:33
    Local Token Validation
  • Урок 38. 00:04:00
    The Best of Both Worlds: Using an API Gateway
  • Урок 39. 00:02:08
    Increasing Security with Short Token Lifetimes
  • Урок 40. 00:03:51
    Improving User Experience with Long Token Lifetimes
  • Урок 41. 00:04:39
    Contextually Choosing Token Lifetimes
  • Урок 42. 00:03:32
    Reasons Why an Access Token May become Invalidated
  • Урок 43. 00:04:11
    The Problem with Local Validation
  • Урок 44. 00:01:32
    Token Lifetime Considerations
  • Урок 45. 00:02:20
    How Applications can Revoke Access Tokens
  • Урок 46. 00:02:48
    The Purpose of OAuth Scopes
  • Урок 47. 00:04:44
    Defining Scopes for your API
  • Урок 48. 00:03:02
    Prompting the User for Consent
  • Урок 49. 00:02:59
    The Future of OAuth: OAuth 2.1
  • Урок 50. 00:01:52
    Additional Resources and Further Reading
  • Урок 51. 00:01:17
    Thank You for Taking the Course!