OAuth 2.0 Security

Description

OAuth 2.0 is the valet key of the web – a delegation framework often mistaken for a strictly authorization framework. This course will help you answer many questions: What is OAuth? When should I use it? How do I use it securely? How does it fit into the big picture of many organizations IAM infrastructure?

Course Themes

  • OAuth 2.0 is a framework, not a standard, everyone will use it differently
  • Make sure you are using OAuth 2.0 for the right reason
  • OAuth 2.0 is bearer-token-based – easy to use but significant security concerns abound
  • Much of the work of building secure OAuth 2.0 solutions is up to the developer

Learning Objectives

  • Determine when to use OAuth 2.0
  • Identify differences for various OAuth 2.0 workflows (grant types)
  • Discuss the security implications of OAuth 2.0
  • Discuss the various extensions to OAuth 2.0

Details

Delivery Format: eLearning

Duration: 1 1/4 hours

Level: Intermediate

Intended Audience: 

  • Back-end developers
  • Enterprise developers
  • Architects