Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying OAuth 2.0 Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
OAuth 2.0 Cookbook

OAuth 2.0 Cookbook

By : Adolfo Eloy Nascimento
3.7 (3)
close
close
OAuth 2.0 Cookbook

OAuth 2.0 Cookbook

3.7 (3)
By: Adolfo Eloy Nascimento

Overview of this book

OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications. The book starts by presenting you how to interact with some public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. You will also be able to implement your own OAuth 2.0 provider with Spring Security OAuth2. Next, the book will cover practical scenarios regarding some important OAuth 2.0 profiles such as Dynamic Client Registration, Token Introspection and how to revoke issued access tokens. You will then be introduced to the usage of JWT, OpenID Connect, and how to safely implement native mobile OAuth 2.0 Clients. By the end of this book, you will be able to ensure that both the server and client are protected against common vulnerabilities.
Table of Contents (9 chapters)
close
close

Introduction


Nowadays we have scenarios which demand that applications interact with a large number of services and also provide services by themselves distributed as APIs throughout the network. Despite this, it's common to allow users of our applications to grant permissions to third-party applications, where OAuth 2.0 has proven to be a good option.

In this chapter, you will learn how to create, configure, and distribute an OAuth 2.0 Provider covering distinct scenarios using all the grant types described by the OAuth 2.0 specification, as well as how to use different access token management strategies through relational databases and Redis (a NoSQL database). All the recipes in this chapter will be implemented using Spring Security OAuth2, which at the time of writing this book, was at the 2.2.0.RELEASE version (check the official documentation for Spring Security OAuth2 at http://projects.spring.io/spring-security-oauth/docs/oauth2.html). It's important learning how to configure your...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
OAuth 2.0 Cookbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon