OAuth 2 in action
Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client and server sides. About the Technolo...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Shelter Island, New York :
Manning Publications
[2017]
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630108306719 |
Tabla de Contenidos:
- What is OAuth 2.0 and why should you care?
- The OAuth dance
- Building a simple OAuth client
- Building a simple OAuth protected resource
- Building a simple OAuth authorization server
- OAuth 2.0 in the real world
- Common client vulnerabilities
- Common protected resources vulnerabilities
- Common authorization server vulnerabilities
- Common OAuth token vulnerabilities
- OAuth tokens
- Dynamic client registration
- User authentication with OAuth 2.0
- Protocols and profiles using OAuth 2.0
- Beyond bearer tokens
- Summary and conclusions.