Description |
1 online resource (1 volume) : illustrations |
Note |
Includes index. |
Contents |
What is OAuth 2.0 and why should you care? -- The OAuth dance -- Building a simple OAuth client -- Building a simple OAuth protected resource -- Building a simple OAuth authorization server -- OAuth 2.0 in the real world -- Common client vulnerabilities -- Common protected resources vulnerabilities -- Common authorization server vulnerabilities -- Common OAuth token vulnerabilities -- OAuth tokens -- Dynamic client registration -- User authentication with OAuth 2.0 -- Protocols and profiles using OAuth 2.0 -- Beyond bearer tokens -- Summary and conclusions. |
Summary |
This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. |
Subject |
Application program interfaces (Computer software)
|
|
World Wide Web -- Security measures.
|
|
Web services -- Access control.
|
|
Data protection.
|
|
Interfaces de programmation d'applications. |
|
Web -- Sécurité -- Mesures. |
|
Services Web -- Accès -- Contrôle. |
|
Protection de l'information (Informatique) |
|
APIs (interfaces) |
|
Application program interfaces (Computer software) |
|
Data protection |
|
World Wide Web -- Security measures |
Added Author |
Sanso, Antonio, author.
|
Added Title |
OAuth two in action |
ISBN |
161729327X |
|
9781617293276 |
|