Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Protecting Your APIs with OAuth

Okta via YouTube

Overview

Discover how to secure API access using OAuth 2.0 and avoid common API security pitfalls in this 59-minute webinar. Explore various OAuth flows, including the Authorization Code Flow, and understand the intricacies of access tokens, JSON Web Tokens, and token lifetimes. Delve into different token types, browser-based applications, password grants, and Rich Authorization Requests. Learn about the importance of the state parameter and gain insights from the OAuth 2.0 Simplified book. Access additional resources, including community websites, videos, and best practices for OAuth implementation. Presented by Okta, this webinar offers valuable knowledge for developers looking to enhance API security and user account management in web and mobile applications.

Syllabus

Intro
Who am I
Common pattern
The original problem
Why OAuth is confusing
OAuth Flows
Authorization Code Flow
Access Tokens
JSON Web Tokens
Token Lifetime
Different Types of Tokens
BrowserBased Apps
Password Grant
Rich Authorization Requests
Questions
State Parameter
OAuth 2 Simplified Book

Taught by

Okta

Reviews

Start your review of Protecting Your APIs with OAuth

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.