While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is particularly good and bad at, and how to integrate it smoothly and safely into their systems. In this course, review the basics of OAuth 2.0 and OpenID Connect, and learn how to use them to authenticate your applications. Learn about tokens, scopes, and claims; OAuth flows; common security considerations; and more.
1 - Introduction
|
|
|
|
01. Welcome
|
02. What you should know before watching this course
|
03. Exercise files
|
2 - 1. What Is OAuth
|
|
|
|
04. What is OAuth 2.0, and why does it matter
|
05. How does OAuth 2.0 work, and what problems does it solve
|
06. How does it compare and contrast with other technologies
|
07. What is OpenID Connect, and how is it different from OAuth
|
3 - 2. Core Terminology
|
|
|
|
08. Understanding the OAuth endpoints
|
09. OAuth tokens and their usage - Access, ID, and refresh
|
10. JWT token management - Security, validation, and revocation
|
11. The purpose of scopes and claims
|
4 - 3. Client Credential - Authorization for Microservices
|
|
|
|
12. Authorization in microservices
|
13. Lab - Build an example with the command line and Postman
|
14. Common security considerations
|
5 - 4. Implicit or Hybrid - Authorization for Mobile Devices
|
|
|
|
15. Authorization for mobile apps and SPA
|
16. Lab - Build an example with JavaScript
|
17. Common security considerations
|
6 - 5. Grant Type - Authorization Code
|
|
|
|
18. Authorization code for web applications
|
19. Lab - Build an example with Postman
|
20. Common Security Considerations
|
7 - 6. Grant Type - Resource Owner Password Flow
|
|
|
|
21. Authorization in legacy applications
|
22. Lab - Build an example in curl
|
23. Common security considerations
|
8 - 7. Server-Side Implementations
|
|
|
|
24. Lab - Configuring an OAuth server in PHP
|
25. Lab - Configuring an OAuth server in Node
|
26. OAuth 2.0 as a service using Okta
|
8 - 7. Server-Side Implementations
|
|||
27. Next steps
|