OAuth 2 in action

Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client and server sides. About the Technolo...

Descripción completa

Detalles Bibliográficos
Otros Autores: Richer, Justin, author (author), Sanso, Antonio, author (writer of foreword), Glazer, Ian, writer of foreword
Formato: Libro electrónico
Idioma:Inglés
Publicado: Shelter Island, New York : Manning Publications [2017]
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630108306719
Tabla de Contenidos:
  • What is OAuth 2.0 and why should you care?
  • The OAuth dance
  • Building a simple OAuth client
  • Building a simple OAuth protected resource
  • Building a simple OAuth authorization server
  • OAuth 2.0 in the real world
  • Common client vulnerabilities
  • Common protected resources vulnerabilities
  • Common authorization server vulnerabilities
  • Common OAuth token vulnerabilities
  • OAuth tokens
  • Dynamic client registration
  • User authentication with OAuth 2.0
  • Protocols and profiles using OAuth 2.0
  • Beyond bearer tokens
  • Summary and conclusions.