Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Getting Started With OAuth 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Getting Started with OAuth 2.

0
by Scott Brady

OAuth 2.0 is the go-to solution for API security, bringing authorization and delegation to modern
HTTP APIs. In this course, you'll learn the fundamentals of OAuth, allowing you to architect and
implement the right solution for your requirements.

Description

OAuth 2.0 is the go-to solution for API security, bringing authorization and delegation to modern
HTTP APIs. In this course, Getting Started with OAuth 2.0, you'll learn the fundamentals of OAuth
and why it is preferred over past solutions. First, you'll explore each grant type and flow in detail,
looking at their strengths and weaknesses, and when they should be used or not. Next, you'll take
a close look at native applications such as mobile apps, and their unique security issues when
using OAuth. Finally, you'll learn some common extensions to the OAuth protocols, such as
OpenID Connect and the upcoming OAuth device flow. All of this will be covered without using any
particular programming language or stack. When you're finished with this course, you will know
how to integrate with any OAuth 2 authorization server and architect the right solution for you.

Course Overview

Hi everyone, my name is Scott Brady, and welcome to my course, Getting Started with OAuth 2. 0.
In this course, we are going to take a look at the OAuth 2 authorization framework and some of
the work that's been happening that makes OAuth and its extensions the gold standard for API
security. This course is going to be completely programming free, and it's suitable for software
developers of any language or stack. We'll be taking a detailed look at API authorization as a
whole, including both what OAuth aims to solve and why older methods should no longer be used.
We will see OAuth grant types and when each one is suitable for usage and when they are not,
how native applications such as mobile apps have their own challenges and solutions, and finally,
the future of OAuth, taking a look at some of the upcoming extension specifications and how
existing extensions can be used. If you're looking for a course that will allow you to understand
and have a fighting chance with any OAuth implementation, then you're in the right place. This
course will allow you to talk the talk and architect the right solution for you. I hope you'll join me
on this journey to learn OAuth 2 and API authorization with the Getting Started with OAuth 2. 0
course, at Pluralsight.
API Security 101

Introduction

Hi, my name is Scott Brady, and welcome to Getting Started with OAuth 2. 0. In this course, we'll
be taking a look at the OAuth 2 authorization framework and some of the work that's been
happening around it that makes OAuth and its extensions the gold standard for API authorization.
In this module, we're going to take a look at the problem of API authorization, looking at how
technologies have changed and how new application types have made us adapt and, in turn,
create protocols such as OAuth. We're then going to take a look at past API authorization solutions
because understanding why other techniques shouldn't be used anymore is just as important as
understanding why we use the current solutions. If you're already familiar with why credential
sharing, cookies, and API keys aren't suitable for modern applications, then feel free to skip these
sections. We are then going to look at the current solution for API security, which is OAuth 2,
taking a high-level look at how this protocol works and how the pieces fit together. We're then
going to discuss some of the common criticisms with OAuth and see if they have any merit. In this
module, we're going to keep things pretty abstract and leave the actual HTTP requests and
technical details to the next module called OAuth in Detail.

You might also like