- Mastering OAuth 2.0
- Charles Bihis
- 353字
- 2021-07-30 10:05:08
What this book covers
Chapter 1, Why Should I Care About OAuth 2.0?, introduces the OAuth 2.0 protocol, and discusses its purpose, prevalence, and importance.
Chapter 2, A Bird's Eye View of OAuth 2.0, takes a high-level look at the OAuth 2.0 protocol and the different workflows it describes.
Chapter 3, Four Easy Steps, enumerates the simple steps necessary to integrate with a service provider using the OAuth 2.0 protocol.
Chapter 4, Register Your Application, details the first of these four steps which covers registering your application with the service provider.
Chapter 5, Get an Access Token with the Client-Side Flow, discusses the complicated topic of gaining access to a protected resource from what we call an untrusted client.
Chapter 6, Get an Access Token with the Server-Side Flow, discusses the complicated topic of gaining access to a protected resource from what we call a trusted client.
Chapter 7, Use Your Access Token, outlines the process for exercising access to a resource once it has been granted to you.
Chapter 8, Refresh Your Access Token, talks about the process of refreshing your access once it expires.
Chapter 9, Security Considerations, discusses the many important security considerations to be made in your application. This is an important topic for any application, but is especially important given the power that this protocol allows.
Chapter 10, What About Mobile?, is a chapter dedicated to the topic of mobile devices, including phones and tablets, and all of the considerations that come with it.
Chapter 11, Tooling and Troubleshooting, talks about how to troubleshoot issues with your integration as well as how to appropriately handle errors so as to minimize user interaction.
Chapter 12, Extensions to OAuth 2.0, looks at the various ways OAuth 2.0 can be extended to satisfy a multitude of use cases.
Appendix A, Resource Owner Password Credentials Grant, takes a look at one of the supplemental supported flows in the book.
Appendix B, Client Credentials Grant, takes a look at another of the supplemental supported flows in the book.
Appendix C, Reference Specifications, enumerates the various open specifications that are referenced throughout the book.
- Microsoft Exchange Server PowerShell Cookbook(Third Edition)
- 工程軟件開發技術基礎
- Visual C++串口通信開發入門與編程實踐
- 數據結構(Java語言描述)
- Java網絡編程核心技術詳解(視頻微課版)
- 深入實踐Kotlin元編程
- UML軟件建模
- Mastering PowerCLI
- SQL Server on Linux
- 軟技能2:軟件開發者職業生涯指南
- Learning iOS Penetration Testing
- Python Django Web從入門到項目實戰(視頻版)
- Java Script從入門到精通(第5版)
- 菜鳥成長之路
- jQuery權威指南