OAuth 2.0 Security

Description

OAuth 2.0 is a widely used framework for securing access to APIs. But because of its complexity, many developers struggle to use and integrate OAuth 2.0 securely. In this course, we introduce the core concepts of OAuth 2.0, look at the different flows, and cover the two most common deployment scenarios. We also look at common security pitfalls and misconceptions.

Course Themes

  • The purpose of OAuth 2.0
  • Overview of the different OAuth 2.0 flows
  • The two most common OAuth 2.0 deployment scenarios
  • Common pitfalls and misconceptions about OAuth 2.0

Learning Objectives

  • Identify the different actors and roles in an OAuth 2.0 architecture.
  • Use access tokens in OAuth 2.0.
  • Use OAuth 2.0 in front-end and back-end applications to access an API.
  • Understand the difference between access tokens and refresh tokens.

Details

Delivery Format: eLearning

Duration: 1 hour

Level: Intermediate

Intended Audience: 

  • Architects
  • Back-End Developers
  • Enterprise Developers
  • Front-End Developers
  • Mobile Developers

Competencies: Understanding of web (HTTP requests, redirects, etc.)

Prerequisites: None

 

Get more course information


250 / 250