Getting Started with OAuth 2.0
Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches.
OAuth 2 Handbook
Authored with clarity and expertise, this handbook is designed for beginners and professionals alike, offering in-depth insights into the principles and practices that underpin OAuth 2.0.
OAuth 2.0: All you need to know
This book provides a comprehensive exploration of the OAuth 2.0 authorization framework, its underlying principles, and its practical applications across various industries.
OAuth
... OAuth flow takes on a specific role in the overall OAuth solution. The following actors can be found in all OAuth-based interactions: OAuth Provider (also known as OAuth server or authorization server) Resource Provider (usually a set ...
Cloud Native Data Security with OAuth
... OAuth to represent the modern OAuth 2.0 authorization framework , first defined in RFC 6749. OAuth 2.0 has strong technology support in all current API , web , and mobile technology stacks . OAuth 2.0 supersedes the OAuth 1.0 protocol ...
OAuth 2 in Action
Justin Richer, Antonio Sanso. Chapter. 11. OAuth. tokens. This chapter covers • What an OAuth token is • Including information in structured JSON Web Tokens ( JWT ) • Protecting token data with JOSE • Looking up token information in real ...
Cloud Identity Patterns and Strategies
This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.
Oauth 2.0 Simplified
It allows users to grant external applications access to their data, such as profile data, photos, and email, without compromising security. OAuth 2.0 Simplified is a guide to building an OAuth 2.0 server.
Oauth 2.0 Identity and Access Management Patterns
This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software ...
Mastering OAuth 2.0
This is all achievable through the power of OAuth. With a focus on practicality and security, this book takes a detailed and hands-on approach to explaining the protocol, highlighting important pieces of information along the way.
OAuth 2.0: The Definitive Guide
This is a definitive guide to the OAuth 2 protocol.
Solving Identity Management in Modern Applications
This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future.
OAuth 2.0 Cookbook
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies. About This Book Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.
Advanced API Security
The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security.
Advanced API Security
This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential.
OAuth 2.0 Made Easy
If so, this book is for you. OAuth 2.0 Made Easy is designed for non-developers, business professionals, and technical leaders who need to understand how OAuth powers today's digital security.
Core Python Applications Programming
Wesley J Chun. Figure 11-23 Getting the OAuth token and OAuth token secret from Twitter. OAuth is an open authorization protocol that provides for a safe and secure way of letting applications access data on your behalf via an API ...
OAuth 2.0
Sven Haiges betrachtet in seinem shortcut OAuth 2.0 aus Sicht des Clients und stellt den Authorization Code Grant vor. Dies ist der wichtigste Grant, der u. a. von Google, Facebook oder Pinterest benutzt wird.
Keycloak - Identity and Access Management for Modern Applications
By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.What you will learn Understand how to install, configure, and manage Keycloak Secure your new and ...
