Authentication as a Microservice - Portable Customer Identity Management

Authentication as a Microservice - Portable Customer Identity Management

OWASP Foundation via YouTube Direct link

Introduction

1 of 23

1 of 23

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Authentication as a Microservice - Portable Customer Identity Management

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 How did we log into these apps
  3. 3 Cookies are secure
  4. 4 Why is this painful
  5. 5 The evolution
  6. 6 Tokenization
  7. 7 Token Mapping
  8. 8 JSON Web Token
  9. 9 Header and Body
  10. 10 Signature
  11. 11 Select Change
  12. 12 Show Code
  13. 13 No Signature
  14. 14 HMAC Hack
  15. 15 RSA Public Key
  16. 16 Verifying RSA Signature
  17. 17 Rotating Keys
  18. 18 Key ID
  19. 19 JSON
  20. 20 Hackproof Security
  21. 21 Refresh Tokens
  22. 22 Revocation
  23. 23 Auth to access tokens

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.