OAuth 2.1 and Beyond

OAuth 2.1 and Beyond

NDC Conferences via YouTube Direct link

Weakness of Bearer Tokens

17 of 33

17 of 33

Weakness of Bearer Tokens

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

OAuth 2.1 and Beyond

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 High Security OAuth
  3. 3 Relevant Documents
  4. 4 OAuth 2.1
  5. 5 Rich Authorization Requests (RAR)
  6. 6 Example (2)
  7. 7 Example Authorization Request
  8. 8 JWT Secured Authorization Requests
  9. 9 Enabling JAR in IdentityServer
  10. 10 Pushed Authorization Requests PAR
  11. 11 Pushed Authorization Request & Respo
  12. 12 Authorization Request using request_
  13. 13 Shared Secrets
  14. 14 Recommendations
  15. 15 Sending a private_key_jwt
  16. 16 "Proof-of-Possession" History
  17. 17 Weakness of Bearer Tokens
  18. 18 Proof of Possession using MTLS
  19. 19 Mutual TLS
  20. 20 Sender Constrained Access Tokens w
  21. 21 Creating an X.509 Client Certificate
  22. 22 Setting a Client Certificate
  23. 23 Calling the Token Endpoint
  24. 24 MTLS Endpoints
  25. 25 Server Metadata
  26. 26 Choice of Web Server / Proxy
  27. 27 Example: Sub-domains with Nginx
  28. 28 Reading Certificate from Header
  29. 29 Certificate Authentication Handler
  30. 30 Enabling MTLS in IdentityServer
  31. 31 Verifying Access Token Ownership at Rese
  32. 32 Pipeline Overview
  33. 33 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.