OAuth 2 in Action
Mega Sale! Save 25% on the OAuth 2 in Action by Manning Publications at Translate This Website. MPN: 44801221. Hurry! Limited time offer. Offer valid only while supplies last. Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization
OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.
About the Book
OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.
- Covers OAuth 2 protocol and design
- Authorization with OAuth 2
- OpenID Connect and User-Managed Access
- Implementation risks
- JOSE, introspection, revocation, and registration
- Protecting and accessing REST APIs
About the Reader
Readers need basic programming skills and knowledge of HTTP and JSON.
About the Author
Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.
Table of Contents
Part 1 - First steps
- What is OAuth 2.0 and why should you care?
- The OAuth dance
Part 2 - Building an OAuth 2 environment
- Building a simple OAuth client
- Building a simple OAuth protected resource
- Building a simple OAuth authorization server
- OAuth 2.0 in the real world
Part 3 - OAuth 2 implementation and vulnerabilities
- Common client vulnerabilities
- Common protected resources vulnerabilities
- Common authorization server vulnerabilities
- Common OAuth token vulnerabilities
Part 4 - Taking OAuth further
- OAuth tokens
- Dynamic client registration
- User authentication with OAuth 2.0
- Protocols and profiles using OAuth 2.0
- Beyond bearer tokens
- Summary and conclusions
|Item Weight:||1.25 pounds|
|Item Size:||0.7 x 9.2 x 9.2 inches|
|Package Weight:||1.25 pounds|
|Package Size:||7.32 x 0.39 x 0.39 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Manning Publications, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
Related Best Sellers
By McGraw-Hill Education
ean: 9780071622547, isbn: 9780071622547,
Master Oracle Fusion Middleware Successfully design rich enterprise web applications using the detailed information in this Oracle Press volume. Oracle Fusion Developer Guide goes beyond the predominant drag-and-drop methods in Oracle JDeveloper 11g ...
mpn: 36161995, ean: 9781597499576, isbn: 1597499579,
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python...
By Packt Publishing
ean: 9781789130706, isbn: 1789130700,
Discover how to use the next-generation language Red for full-stack development, from systems coding over user-interfaces to blockchain programmingKey FeaturesExplore the latest features of Red to build scalable, fast, and secure applicationsLearn gr...
ean: 9783319937816, isbn: 3319937812,
This book constitutes the refereed proceedings of the 8th Language and Technology Conference: Challenges for Computer Science and Linguistics, LTC 2017, held in Poznan, Poland, in November 2017. The 31 revised papers presented in this volume were car...
By No Starch Press
mpn: 48227133, ean: 9781593278229, isbn: 1593278225,
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classica...
mpn: colour illustrations, ean: 9781908043764, isbn: 1908043768,
This is a full-color transcript of a lecture which introduces a pattern language for memory forensics - investigation of past software behaviour in memory snapshots. It provides a unified language for discussing and communicating detection and analys...
By Packt Publishing - ebooks Account
ean: 9781788839044, isbn: 1788839048,
Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.Key FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild...
By CreateSpace Independent Publishing Platform
ean: 9781543215090, isbn: 1543215092,
Computer security has become the next battlefield of national defense. Public, private and governmental security is being compromised at an increasing rate. Correspondingly the field of computer security is generating the latest form of defense. This...
By McGraw-Hill Education
ean: 9780071831796, isbn: 9780071831796,
Operational, tested information security and privacy practices for the healthcare environment Written by an expert in the field with multiple industry certifications, this definitive resource fully addresses information security and privacy considera...
By For Dummies
ean: 9781119428114, isbn: 1119428114,
Sharpen your knowledge of C#C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies of...