- Mastering OAuth 2.0
- Charles Bihis
- 353字
- 2021-07-30 10:05:08
What this book covers
Chapter 1, Why Should I Care About OAuth 2.0?, introduces the OAuth 2.0 protocol, and discusses its purpose, prevalence, and importance.
Chapter 2, A Bird's Eye View of OAuth 2.0, takes a high-level look at the OAuth 2.0 protocol and the different workflows it describes.
Chapter 3, Four Easy Steps, enumerates the simple steps necessary to integrate with a service provider using the OAuth 2.0 protocol.
Chapter 4, Register Your Application, details the first of these four steps which covers registering your application with the service provider.
Chapter 5, Get an Access Token with the Client-Side Flow, discusses the complicated topic of gaining access to a protected resource from what we call an untrusted client.
Chapter 6, Get an Access Token with the Server-Side Flow, discusses the complicated topic of gaining access to a protected resource from what we call a trusted client.
Chapter 7, Use Your Access Token, outlines the process for exercising access to a resource once it has been granted to you.
Chapter 8, Refresh Your Access Token, talks about the process of refreshing your access once it expires.
Chapter 9, Security Considerations, discusses the many important security considerations to be made in your application. This is an important topic for any application, but is especially important given the power that this protocol allows.
Chapter 10, What About Mobile?, is a chapter dedicated to the topic of mobile devices, including phones and tablets, and all of the considerations that come with it.
Chapter 11, Tooling and Troubleshooting, talks about how to troubleshoot issues with your integration as well as how to appropriately handle errors so as to minimize user interaction.
Chapter 12, Extensions to OAuth 2.0, looks at the various ways OAuth 2.0 can be extended to satisfy a multitude of use cases.
Appendix A, Resource Owner Password Credentials Grant, takes a look at one of the supplemental supported flows in the book.
Appendix B, Client Credentials Grant, takes a look at another of the supplemental supported flows in the book.
Appendix C, Reference Specifications, enumerates the various open specifications that are referenced throughout the book.
- VMware View Security Essentials
- Mastering Entity Framework Core 2.0
- 國際大學生程序設計競賽中山大學內部選拔真題解(二)
- 前端跨界開發指南:JavaScript工具庫原理解析與實戰
- Twilio Best Practices
- Web交互界面設計與制作(微課版)
- TestNG Beginner's Guide
- 精通搜索分析
- 基于差分進化的優化方法及應用
- 名師講壇:Spring實戰開發(Redis+SpringDataJPA+SpringMVC+SpringSecurity)
- PLC編程與調試技術(松下系列)
- Java EE核心技術與應用
- Java Web開發就該這樣學
- Visual Basic 6.0程序設計實驗教程
- PostgreSQL 12 High Availability Cookbook