Custom cover image
Custom cover image

Mastering OAuth 2.0

By: Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Birmingham ; Mumbai : Packt Publishing, 2015Copyright date: ©2015Description: 1 Online-Ressource (238 p)ISBN:
  • 9781784392307
Subject(s): Additional physical formats: 9781784392307. | 9781784395407 | Print version: Mastering OAuth 2.0. Birmingham : Packt Publishing,c1900 | Erscheint auch als: Mastering OAuth 2.0. Druck-Ausgabe Birmingham : Packt Publishing, 2015. XIII, 209 SeitenDDC classification:
  • 005.8
  • 5.133
LOC classification:
  • QA76.9.A25
Online resources: Summary: Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Why Should I Care About OAuth 2.0? -- Authentication versus authorization -- Authentication -- Authorization -- What problems does it solve? -- Federated identity -- Delegated authority -- Real-life examples of OAuth 2.0 in action -- How does OAuth 2.0 actually solve the problem? -- Without OAuth 2.0 - GoodApp wants to suggest contacts by looking at your Facebook friendsSummary: With OAuth 2.0 - GoodApp wants to suggest contacts by looking at your Facebook friends -- Who uses OAuth 2.0? -- Introducing ""The World's Most Interesting Infographic Generator"" -- Summary -- Chapter 2: A Bird's Eye View of OAuth 2.0 -- How does it work? -- User consent -- Two main flows for two main types of client -- Trusted versus untrusted clients -- First look at the client-side flow -- An untrusted client - GoodApp requests access for user's Facebook friends using implicit grant -- The big picture -- When should this be used? -- Pros and cons of being an untrusted client -- Pros -- ConsSummary: First look at the server-side flow -- A trusted client - GoodApp requests access for user's Facebook friends using authorization code grant -- The big picture -- When should this be used? -- Pros and cons of being a trusted client -- Pros -- Cons -- What are the differences? -- What about mobile? -- Summary -- Chapter 3: Four Easy Steps -- Let's get started -- Step 1 - Register your client application -- Different service providers, different registration process, same OAuth 2.0 protocol -- Your client credentials -- Step 2 - Get your access token -- A closer look at access tokens -- ScopeSummary: Duration of access -- Token revocation -- Sometimes a refresh token -- Step 3 - Use your access token -- An access token is an access token -- Step 4 - Refresh your access token -- What if I don't have a refresh token? -- Refresh tokens expire too -- Putting it all together -- Summary -- Chapter 4: Register Your Application -- Recap of registration process -- Registering your application with Facebook -- Creating your application -- Setting your redirection endpoint -- What is a redirection endpoint? -- Find your service provider's authorization and token endpoints -- Putting it all together!Summary: Summary -- Chapter 5: Get an Access Token with the Client-Side Flow -- Refresher on the implicit grant flow -- A closer look at the implicit grant flow -- Authorization request -- According to the specification -- In our application -- Access token response -- Success -- Error -- Let's build it! -- Build the base application -- Install Apache Maven -- Create the project -- Configure base project to fit our application -- Modify the hosts file -- Running it for the first time -- Make the authorization request -- Handle the access token response -- Summary -- Reference pagesSummary: Authorization requestPPN: PPN: 859364712Package identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE
No physical items for this record