Cargando…

Getting started with OAuth 2.0 /

Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users' data--such as user profiles, phot...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Boyd, Ryan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly, ©2012.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn798669679
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 120710s2012 caua o 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d CUS  |d OCLCO  |d COO  |d WAU  |d YDXCP  |d DEBSZ  |d NLE  |d OCLCQ  |d OCLCO  |d EBLCP  |d N$T  |d TEFOD  |d AU@  |d OCLCO  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d FEM  |d NRC  |d OCLCQ  |d OCLCO  |d OCLCF  |d BRL  |d CEF  |d MOQ  |d UAB  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 779828647  |a 880883000  |a 968046920  |a 969002858 
020 |a 9781449331627  |q (electronic bk.) 
020 |a 1449331629  |q (electronic bk.) 
020 |a 9781449317843 
020 |a 1449317847 
020 |a 9781449331610  |q (electronic bk.) 
020 |a 1449331610  |q (electronic bk.) 
020 |z 9781449311605  |q (pbk.) 
020 |z 1449311601  |q (pbk.) 
029 1 |a AU@  |b 000049904247 
029 1 |a AU@  |b 000052907229 
029 1 |a DEBBG  |b BV040901646 
029 1 |a DEBSZ  |b 378289977 
029 1 |a DEBSZ  |b 381376869 
029 1 |a DEBSZ  |b 397251556 
029 1 |a GBVCP  |b 747216053 
029 1 |a AU@  |b 000062629303 
035 |a (OCoLC)798669679  |z (OCoLC)779828647  |z (OCoLC)880883000  |z (OCoLC)968046920  |z (OCoLC)969002858 
037 |a CL0500000152  |b Safari Books Online 
037 |a 56896B77-4276-49F0-9F17-00D15D1D957A  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9  |b .B69 2012eb 
072 7 |a EDU  |x 039000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Boyd, Ryan. 
245 1 0 |a Getting started with OAuth 2.0 /  |c Ryan Boyd. 
246 3 0 |a OAuth 2.0 
250 |a 1st ed. 
260 |a Sebastopol, CA :  |b O'Reilly,  |c ©2012. 
300 |a 1 online resource (x, 66 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
588 0 |a Print version record. 
505 0 |a Table of Contents; Preface; Conventions Used in This Book; Using Code Examples; Safari® Books Online; How to Contact Us; Acknowledgments; Chapter 1. Introduction; How OAuth Was Born; Why Developers Should Care About OAuth; Why Don't These APIs Just Use Passwords for Authorization?; Terminology; Authentication; Federated Authentication; Authorization; Delegated Authorization; Roles; The Great Debate over Signatures; Mitigating Concerns with Bearer Tokens; Signing Your OAuth 2.0 Requests; Getting the key; Making API requests; Developer and Application Registration. 
505 8 |a Why Is Registration Necessary?Client Profiles, Access Tokens, and Authorization Flows; Client Profiles; Access Tokens; Authorization Flows; Chapter 2. Server-Side Web Application Flow; When Should the Authorization Code Flow Be Used?; Security Properties; User Experience; Step-by-Step; Step 1: Let the user know what you're doing and request authorization; Error handling; Step 2: Exchange authorization code for an access token; Why both access tokens and refresh tokens?; Step 3: Call the API; Error handling; Step 4a: Refresh the access token; Step 4b: Obtaining a new access token. 
505 8 |a How Can Access Be Revoked?Chapter 3. Client-Side Web Applications Flow; When Should the Implicit Grant Flow Be Used?; Limitations of the Implicit Grant Flow; Security Properties; User Experience; Step-by-Step; Step 1: Let the user know what you're doing and request authorization; Error handling; Step 2: Parsing the access token from the URL; Step 3: Call the API; Step 4: Refreshing the access token; How Can Access Be Revoked?; Chapter 4. Resource Owner Password Flow; When Should the Resource Owner Password Flow Be Used?; Security Properties; User Experience; Step-by-Step. 
505 8 |a Step 1: Ask the user for their credentialsStep 2: Exchange the credentials for an access token; Step 3: Call the API; Step 4: Refresh the access token; Chapter 5. Client Credentials Flow; When Should the Client Credentials Flow Be Used?; What APIs Support the Client Credentials Flow?; How Does the Client Authenticate?; Security Properties; Step-by-Step; Step 1: Exchange the application's credentials for an access token; Step 2: Call the API; When the Access Token Expires; Chapter 6. Getting Access to User Data from Mobile Apps; Why You Should Use OAuth for Native Mobile Apps. 
505 8 |a What Flow Should Be Used for Native Mobile Apps?Do You Have a Mobile Backend Web Server for Your Application?; The (Ugly) Web Browser; Embedded WebView; System Web Browser; Enhanced Mobile App Authorization for Specific Providers; For Google; For Facebook; Chapter 7. OpenID Connect Authentication; ID Token; Security Properties; Obtaining User Authorization; Check ID Endpoint; UserInfo Endpoint; Performance Improvements; Practical OpenID Connect; For Google; For Facebook; OpenID Connect Evolution; Chapter 8. Tools and Libraries; Google's OAuth 2.0 Playground; Google's TokenInfo Endpoint. 
520 |a Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users' data--such as user profiles, photos, videos, and contact lists--to improve their experience of your application. Through code examples, step-by-step instructions, and use-case examples, you'll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, st. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a OAuth. 
630 0 7 |a OAuth.  |2 blmlsh 
650 0 |a Application program interfaces (Computer software) 
650 0 |a World Wide Web  |x Security measures. 
650 0 |a Web services  |x Access control. 
650 0 |a Data protection. 
650 6 |a Interfaces de programmation d'applications. 
650 6 |a Web  |x Sécurité  |x Mesures. 
650 6 |a Services Web  |x Accès  |x Contrôle. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a APIs (interfaces)  |2 aat 
650 7 |a EDUCATION  |x Computers & Technology.  |2 bisacsh 
650 7 |a Application program interfaces (Computer software)  |2 fast  |0 (OCoLC)fst00811704 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a World Wide Web  |x Security measures.  |2 fast  |0 (OCoLC)fst01181329 
776 0 8 |i Print version: Boyd, Ryan.  |t Getting started with OAuth 2.0.  |b 1st ed.  |d Sebastopol, CA : O'Reilly, ©2012  |z 9781449311605  |w (OCoLC)764382903 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781449317843/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH22930951 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23071379 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL867855 
938 |a EBSCOhost  |b EBSC  |n 438224 
938 |a YBP Library Services  |b YANK  |n 7475581 
994 |a 92  |b IZTAP