Plan Szkolenia

Introduction

  • Overview of OAuth
  • Understanding API security

OAuth

  • Protocol endpoints
  • Scope
  • Authorization code for web apps
  • Implicit flow for single-page apps
  • Client credentials for machines
  • Resource owner password credentials
  • Long-lived access with refresh tokens
  • Choosing the right response mode
  • Simplifying OAuth with OAuth 2.1

Native Applications Best Practices

  • Unique issues of native apps
  • Using PKCE to handle stolen tokens
  • Choosing the best redirect URI

Browser-based Application Best Practices

  • The security profile of the browser-based app
  • OAuth within the browser
  • Avoiding OAuth with SameSite cookies
  • Securing browser-based apps with backend for frontend

Extending OAuth

  • OAuth and Identity with OpenID Connect
  • Configuring clients with OAuth metadata
  • Authorizing the IoT with the OAuth device flow
  • Combining SAML and OAuth with the SAML assertion grant
  • Securing Microservices with token exchange

Summary and Next Steps

Wymagania

  • Basic knowledge of web service and API development

Audience

  • Developers
 7 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (1)

Szkolenia Powiązane

Micro Focus ArcSight ESM Advanced

35 godzin

CCTV Security

14 godzin

CipherTrust Manager

21 godzin

CISA - Certified Information Systems Auditor

28 godzin

CISMP - Certificate in Information Security Management Principles

21 godzin

Computer Room Security and Maintenance

14 godzin

Mastering Continuous Threat Exposure Management (CTEM)

28 godzin

Cybersecurity Fundamentals

28 godzin

DevOps Security: Creating a DevOps Security Strategy

7 godzin

Honeywell Security System

14 godzin

Building up information security according to ISO 27005

21 godzin

Applying Psychological Science to Law Enforcement

14 godzin

NB-IoT for Developers

7 godzin

Network Penetration Testing

35 godzin

Open Data Risk Analysis and Management

21 godzin

Powiązane Kategorie