Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай The Nuts and Bolts of OAuth 2.0, а также все другие курсы, прямо сейчас!
Премиум
  1. Урок 1. 00:02:24
    Intro to this Course
  2. Урок 2. 00:03:37
    A Brief History of OAuth
  3. Урок 3. 00:05:20
    How OAuth Improves Application Security
  4. Урок 4. 00:04:20
    OAuth vs OpenID Connect
  5. Урок 5. 00:04:47
    Roles in OAuth
  6. Урок 6. 00:04:56
    Application Types
  7. Урок 7. 00:05:38
    User Consent
  8. Урок 8. 00:06:14
    Front Channel vs Back Channel
  9. Урок 9. 00:06:55
    Application Identity
  10. Урок 10. 00:01:22
    Introduction to OAuth Clients
  11. Урок 11. 00:04:17
    Registering an Application
  12. Урок 12. 00:11:02
    Authorization Code Flow for Web Applications
  13. Урок 13. 00:01:11
    The Unique Issues of Native Apps
  14. Урок 14. 00:03:35
    Redirect URLs for Native Apps
  15. Урок 15. 00:04:14
    Browser Security for Native Apps
  16. Урок 16. 00:09:08
    Authorization Code Flow for Native Apps
  17. Урок 17. 00:04:11
    Refresh Tokens for Native Apps
  18. Урок 18. 00:04:44
    Problems with the Browser Environment
  19. Урок 19. 00:08:39
    Authorization Code Flow for Single-Page Applications
  20. Урок 20. 00:05:21
    Protecting Tokens in the Browser
  21. Урок 21. 00:02:31
    Securing the Browser with a Backend
  22. Урок 22. 00:03:54
    Limitations of IoT and Smarthome Devices
  23. Урок 23. 00:04:49
    Device Flow for Browserless Devices
  24. Урок 24. 00:02:28
    When to use the Client Credentials Grant
  25. Урок 25. 00:02:05
    Client Credentials Grant for Machine-to-Machine Applications
  26. Урок 26. 00:03:35
    What is an ID Token
  27. Урок 27. 00:02:33
    How ID Tokens are Different from Access Tokens
  28. Урок 28. 00:05:25
    Obtaining an ID Token
  29. Урок 29. 00:04:30
    Hybrid OpenID Connect Flows
  30. Урок 30. 00:06:25
    Validating and Using an ID Token
  31. Урок 31. 00:01:18
    Intro to Protecting an API with OAuth
  32. Урок 32. 00:03:37
    Reference Tokens vs Self-Encoded Tokens
  33. Урок 33. 00:03:53
    Pros and Cons of Reference Tokens
  34. Урок 34. 00:04:51
    Pros and Cons of Self-Encoded Tokens
  35. Урок 35. 00:05:24
    The Structure of a JWT Access Token
  36. Урок 36. 00:04:36
    Remote Token Introspection
  37. Урок 37. 00:06:33
    Local Token Validation
  38. Урок 38. 00:04:00
    The Best of Both Worlds: Using an API Gateway
  39. Урок 39. 00:02:08
    Increasing Security with Short Token Lifetimes
  40. Урок 40. 00:03:51
    Improving User Experience with Long Token Lifetimes
  41. Урок 41. 00:04:39
    Contextually Choosing Token Lifetimes
  42. Урок 42. 00:03:32
    Reasons Why an Access Token May become Invalidated
  43. Урок 43. 00:04:11
    The Problem with Local Validation
  44. Урок 44. 00:01:32
    Token Lifetime Considerations
  45. Урок 45. 00:02:20
    How Applications can Revoke Access Tokens
  46. Урок 46. 00:02:48
    The Purpose of OAuth Scopes
  47. Урок 47. 00:04:44
    Defining Scopes for your API
  48. Урок 48. 00:03:02
    Prompting the User for Consent
  49. Урок 49. 00:02:59
    The Future of OAuth: OAuth 2.1
  50. Урок 50. 00:01:52
    Additional Resources and Further Reading
  51. Урок 51. 00:01:17
    Thank You for Taking the Course!