Almost every company that exposes an API is moving toward using OAuth 2.0 as a delegation framework. Therefore, OAuth 2.0 is still under active development, and a wide variety of complex deployment scenarios are supported. In this course, we investigate various addendums to OAuth 2.0 that lift the security of almost all OAuth 2.0 aspects.
Delivery Format: eLearning
Duration: 2 Hours
Level: Advanced
Intended Audience:
Prerequisites
Introduction
Strong Client Authentication Mechanisms
Client-Based Token Revocation
Using Resource Indicators
Strengthening Bearer Tokens
Delegation in OAuth 2.0 Architectures
Strengthening the Initialization of a Flow
Advanced Scopes and Consent
Wrapping Up OAuth 2.0
Equip development teams with the skills and education to write secure code and fix issues faster