OAuth 2 in action /
This book teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization...
Cote: | Libro Electrónico |
---|---|
Auteurs principaux: | , |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Shelter Island, NY :
Manning Publications,
[2017]
|
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Table des matières:
- What is OAuth 2.0 and why should you care?
- The OAuth dance
- Building a simple OAuth client
- Building a simple OAuth protected resource
- Building a simple OAuth authorization server
- OAuth 2.0 in the real world
- Common client vulnerabilities
- Common protected resources vulnerabilities
- Common authorization server vulnerabilities
- Common OAuth token vulnerabilities
- OAuth tokens
- Dynamic client registration
- User authentication with OAuth 2.0
- Protocols and profiles using OAuth 2.0
- Beyond bearer tokens
- Summary and conclusions.