Course Description
Because many APIs depend on OAuth 2.0 to implement proper access control, applications accessing these APIs need to have established mechanisms to securely support OAuth 2.0. This course discusses the four main OAuth 2.0 flows and how each of them supports a distinct access scenario. You’ll learn how to use OAuth 2.0 to access remote APIs and address client registration, as well as additional security considerations.