Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Securing Your APIs with OAuth 2.0

Okta via YouTube

Overview

Learn how to secure APIs using OAuth 2.0 in this 32-minute conference talk. Explore the OAuth authorization protocol, enabling applications to access user data without credentials. Discover the use of JWT access tokens, their tradeoffs, and how to design granular scopes for backend services. Gain insights into creating a microservices architecture protected by OAuth at the gateway level. Access additional resources, including the speaker's book "OAuth 2.0 Simplified" and Okta's developer services for user account management in web and mobile applications.

Syllabus

Intro
OAuth vs OAuth Exchange
OAuth for First Party Apps
How OAuth Works
Authorization Code Flow
Example
Auth Flow
Pixie
OAuth Worm
Access Tokens
Drawbacks of Access Tokens
SelfEncoded Tokens
JSON Web Token
Is that enough
Token Validation Example
Token Validation Flexibility

Taught by

Okta

Reviews

Start your review of Securing Your APIs with OAuth 2.0

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.