Securely Accessing APIs Using OAuth 2.0

Course Description

Because many APIs depend on OAuth 2.0 to implement proper access control, applications accessing these APIs need to have established mechanisms to securely support OAuth 2.0. This course discusses the four main OAuth 2.0 flows and how each of them supports a distinct access scenario. You’ll learn how to use OAuth 2.0 to access remote APIs and address client registration, as well as additional security considerations.

Course Themes

  • Using OAuth 2.0 to access remote APIs
  • Security properties of the four main OAuth 2.0 flows
  • Security considerations for using OAuth 2.0 in an application

Learning Objectives

  • Describe how to register a client application and request proper permissions.
  • Select the right OAuth 2.0 flow based on the use case you’re handling.
  • Implement an application that uses OAuth 2.0 to access remote APIs.
  • Explain the additional security considerations that need to be taken into account.

Details

Delivery Format: eLearning

Duration: 1 Hour

Level: Intermediate

Intended Audience:

  • Architects
  • Back-End Developers
  • Front-End Developers

Competencies:

  • Basic understanding of web mechanics
  • Basic understanding of OAuth 2.0 concepts

Prerequisites: None    

Get more course information


250 / 250