官术网_书友最值得收藏!

  • Mastering OAuth 2.0
  • Charles Bihis
  • 353字
  • 2021-07-30 10:05:08

What this book covers

Chapter 1, Why Should I Care About OAuth 2.0?, introduces the OAuth 2.0 protocol, and discusses its purpose, prevalence, and importance.

Chapter 2, A Bird's Eye View of OAuth 2.0, takes a high-level look at the OAuth 2.0 protocol and the different workflows it describes.

Chapter 3, Four Easy Steps, enumerates the simple steps necessary to integrate with a service provider using the OAuth 2.0 protocol.

Chapter 4, Register Your Application, details the first of these four steps which covers registering your application with the service provider.

Chapter 5, Get an Access Token with the Client-Side Flow, discusses the complicated topic of gaining access to a protected resource from what we call an untrusted client.

Chapter 6, Get an Access Token with the Server-Side Flow, discusses the complicated topic of gaining access to a protected resource from what we call a trusted client.

Chapter 7, Use Your Access Token, outlines the process for exercising access to a resource once it has been granted to you.

Chapter 8, Refresh Your Access Token, talks about the process of refreshing your access once it expires.

Chapter 9, Security Considerations, discusses the many important security considerations to be made in your application. This is an important topic for any application, but is especially important given the power that this protocol allows.

Chapter 10, What About Mobile?, is a chapter dedicated to the topic of mobile devices, including phones and tablets, and all of the considerations that come with it.

Chapter 11, Tooling and Troubleshooting, talks about how to troubleshoot issues with your integration as well as how to appropriately handle errors so as to minimize user interaction.

Chapter 12, Extensions to OAuth 2.0, looks at the various ways OAuth 2.0 can be extended to satisfy a multitude of use cases.

Appendix A, Resource Owner Password Credentials Grant, takes a look at one of the supplemental supported flows in the book.

Appendix B, Client Credentials Grant, takes a look at another of the supplemental supported flows in the book.

Appendix C, Reference Specifications, enumerates the various open specifications that are referenced throughout the book.

主站蜘蛛池模板: 汤阴县| 获嘉县| 武宣县| 醴陵市| 新巴尔虎左旗| 姜堰市| 化隆| 万年县| 邻水| 拉孜县| 余姚市| 曲靖市| 抚宁县| 金寨县| 浦东新区| 桐梓县| 定兴县| 平陆县| 尚义县| 山西省| 哈尔滨市| 古田县| 望奎县| 彭山县| 红河县| 若尔盖县| 余干县| 岢岚县| 平安县| 平昌县| 临安市| 陵水| 汶川县| 缙云县| 阿勒泰市| 定陶县| 成安县| 玉林市| 罗江县| 松阳县| 凯里市|