Login       My Wishlist
  My Cart
$0.00 / 0 items
Translate This Website
International Translation Network
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Security & Encryption

OAuth 2 in Action

Mega Sale! Save 25% on the OAuth 2 in Action by Manning Publications at Translate This Website. MPN: 44801221. Hurry! Limited time offer. Offer valid only while supplies last. Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization

Product Description


OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.

About the Book

OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.

What's Inside

  • Covers OAuth 2 protocol and design
  • Authorization with OAuth 2
  • OpenID Connect and User-Managed Access
  • Implementation risks
  • JOSE, introspection, revocation, and registration
  • Protecting and accessing REST APIs

About the Reader

Readers need basic programming skills and knowledge of HTTP and JSON.

About the Author

Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.

Table of Contents

    Part 1 - First steps

  1. What is OAuth 2.0 and why should you care?
  2. The OAuth dance
  3. Part 2 - Building an OAuth 2 environment

  4. Building a simple OAuth client
  5. Building a simple OAuth protected resource
  6. Building a simple OAuth authorization server
  7. OAuth 2.0 in the real world
  8. Part 3 - OAuth 2 implementation and vulnerabilities

  9. Common client vulnerabilities
  10. Common protected resources vulnerabilities
  11. Common authorization server vulnerabilities
  12. Common OAuth token vulnerabilities
  13. Part 4 - Taking OAuth further

  14. OAuth tokens
  15. Dynamic client registration
  16. User authentication with OAuth 2.0
  17. Protocols and profiles using OAuth 2.0
  18. Beyond bearer tokens
  19. Summary and conclusions

Additional Information

Manufacturer:Manning Publications
Part Number:44801221
Publisher:Manning Publications
Studio:Manning Publications
Item Weight:1.25 pounds
Item Size:0.7 x 9.2 x 9.2 inches
Package Weight:1.25 pounds
Package Size:7.32 x 0.39 x 0.39 inches

OAuth 2 in Action by Manning Publications

Buy Now:
OAuth 2 in Action

Brand: Manning Publications
4.2 out of 5 stars with 216 reviews
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
You Save: 24%



View More In Security & Encryption.


Have questions about this item, or would like to inquire about a custom or bulk order?

If you have any questions about this product by Manning Publications, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers

Oracle Fusion Developer Guide: Building Rich Internet Applications with Oracle ADF Business Components and Oracle ADF Faces (Oracle Press)
By McGraw-Hill Education
ean: 9780071622547, isbn: 9780071622547,
Master Oracle Fusion Middleware Successfully design rich enterprise web applications using the detailed information in this Oracle Press volume. Oracle Fusion Developer Guide goes beyond the predominant drag-and-drop methods in Oracle JDeveloper 11g ...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
By Syngress
mpn: 36161995, ean: 9781597499576, isbn: 1597499579,
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python...

Learn Red – Fundamentals of Red: Get up and running with the Red language for full-stack development
By Packt Publishing
ean: 9781789130706, isbn: 1789130700,
Discover how to use the next-generation language Red for full-stack development, from systems coding over user-interfaces to blockchain programmingKey FeaturesExplore the latest features of Red to build scalable, fast, and secure applicationsLearn gr...

Human Language Technology. Challenges for Computer Science and Linguistics: 7th Language and Technology Conference, LTC 2015, Poznań, Poland, November ... Papers (Lecture Notes in Computer Science)
By Springer
ean: 9783319937816, isbn: 3319937812,
This book constitutes the refereed proceedings of the 8th Language and Technology Conference: Challenges for Computer Science and Linguistics, LTC 2017, held in Poznan, Poland, in November 2017. The 31 revised papers presented in this volume were car...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
By No Starch Press
mpn: 48227133, ean: 9781593278229, isbn: 1593278225,
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classica...

Pattern-Oriented Memory Forensics: A Pattern Language Approach
By Opentask
mpn: colour illustrations, ean: 9781908043764, isbn: 1908043768,
This is a full-color transcript of a lecture which introduces a pattern language for memory forensics - investigation of past software behaviour in memory snapshots. It provides a unified language for discussing and communicating detection and analys...

Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
By Packt Publishing - ebooks Account
ean: 9781788839044, isbn: 1788839048,
Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.Key FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild...

Computer Security Terminology: " The Language of Computer Security " (Volume 3)
By CreateSpace Independent Publishing Platform
ean: 9781543215090, isbn: 1543215092,
Computer security has become the next battlefield of national defense. Public, private and governmental security is being compromised at an increasing rate. Correspondingly the field of computer security is generating the latest form of defense. This...

Healthcare Information Security and Privacy
By McGraw-Hill Education
ean: 9780071831796, isbn: 9780071831796,
Operational, tested information security and privacy practices for the healthcare environment Written by an expert in the field with multiple industry certifications, this definitive resource fully addresses information security and privacy considera...

C# 7.0 All-in-One For Dummies
By For Dummies
ean: 9781119428114, isbn: 1119428114,
Sharpen your knowledge of C#C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies of...

Privacy Policy / Terms of Service
© 2019 - translateth.is. All Rights Reserved.