Pluralsight - Getting Started with OAuth 2.0 by Scott Brady
File List
- 5. Extending OAuth/1. OAuth + Identity with OpenID Connect.mp4 12.3 MB
- 2. OAuth in Detail/3. Authorization Code for Web Applications.mp4 10.8 MB
- 5. Extending OAuth/4. Securely Authorizing the IoT with the OAuth Device Flow.mp4 10.7 MB
- oauth-2-getting-started.zip 10.5 MB
- 2. OAuth in Detail/5. Implicit Flow for Single Page Applications.mp4 8.7 MB
- 2. OAuth in Detail/11. Long-lived Access with Refresh Tokens.mp4 8.3 MB
- 1. API Security 101/5. The Solution OAuth 2.0.mp4 8.2 MB
- 1. API Security 101/7. OAuth A Misunderstood Protocol.mp4 7.5 MB
- 5. Extending OAuth/7. Securing Microservices with Token Exchange.mp4 6.6 MB
- 2. OAuth in Detail/4. Demo Authorization Code for Web Applications.mp4 4.9 MB
- 3. Best Practices for Native Applications/4. Not All Browsers Are Created Equally.mp4 4.8 MB
- 1. API Security 101/2. A Solution Credential Sharing.mp4 4.7 MB
- 3. Best Practices for Native Applications/1. The Unique Issues of Native Applications.mp4 4.6 MB
- 5. Extending OAuth/6. Combining SAML and OAuth with the SAML Assertion Grant.mp4 4.5 MB
- 2. OAuth in Detail/9. Resource Owner Password Credentials for No One.mp4 4.4 MB
- 5. Extending OAuth/5. Demo Device Flow in Action.mp4 4.3 MB
- 3. Best Practices for Native Applications/2. Dealing with Stolen Tokens Using PKCE.mp4 4.2 MB
- 4. Best Practices for Browser-based Applications/1. The Security Profile of a Browser-based Application.mp4 3.5 MB
- 2. OAuth in Detail/7. Client Credentials for Machines.mp4 3.4 MB
- 0. Course Overview/0. Course Overview.mp4 3.3 MB
- 2. OAuth in Detail/12. Demo Long-lived Access with Refresh Tokens.mp4 3.2 MB
- 1. API Security 101/1. A Problem of API Authorization.mp4 3.1 MB
- 4. Best Practices for Browser-based Applications/2. OAuth within the Browser.mp4 3.0 MB
- 3. Best Practices for Native Applications/5. Demo OAuth for Native Applications in Action.mp4 2.9 MB
- 3. Best Practices for Native Applications/3. Choosing the Best Redirect URI.mp4 2.8 MB
- 5. Extending OAuth/8. Summary.mp4 2.8 MB
- 5. Extending OAuth/2. Demo Identity with OpenID Connect.mp4 2.8 MB
- 3. Best Practices for Native Applications/6. Summary.mp4 2.7 MB
- 5. Extending OAuth/3. Automatically Configuring Clients with OAuth Metadata.mp4 2.6 MB
- 4. Best Practices for Browser-based Applications/3. Avoid OAuth with SameSite Cookies.mp4 2.6 MB
- 1. API Security 101/6. Demo A Very Typical OAuth Flow.mp4 2.4 MB
- 1. API Security 101/4. A Solution API Keys.mp4 2.4 MB
- 2. OAuth in Detail/6. Demo Implicit Flow for Single Page Applications.mp4 2.3 MB
- 2. OAuth in Detail/13. Choosing the Right Response Mode.mp4 2.3 MB
- 2. OAuth in Detail/16. Summary.mp4 2.2 MB
- 2. OAuth in Detail/15. Simplifying OAuth with OAuth 2.1.mp4 2.1 MB
- 1. API Security 101/0. Introduction.mp4 2.0 MB
- 2. OAuth in Detail/14. When Things Go Wrong.mp4 1.9 MB
- 2. OAuth in Detail/1. Protocol Endpoints.mp4 1.8 MB
- 4. Best Practices for Browser-based Applications/4. Secure Browser-based Applications with Backend for Frontend.mp4 1.5 MB
- 3. Best Practices for Native Applications/0. Introduction.mp4 1.5 MB
- 2. OAuth in Detail/0. Introduction.mp4 1.5 MB
- 5. Extending OAuth/0. Introduction.mp4 1.4 MB
- 4. Best Practices for Browser-based Applications/5. Summary.mp4 1.4 MB
- 4. Best Practices for Browser-based Applications/0. Introduction.mp4 1.3 MB
- 1. API Security 101/3. A Solution Cookies.mp4 1.3 MB
- 2. OAuth in Detail/10. Demo Resource Owner Password Credentials for No One.mp4 1.3 MB
- 2. OAuth in Detail/2. What Is a Scope.mp4 1.2 MB
- 1. API Security 101/8. Summary.mp4 1.2 MB
- 2. OAuth in Detail/8. Demo Client Credentials for Machines.mp4 1.0 MB
- 5. Extending OAuth/1. OAuth + Identity with OpenID Connect.srt 11.9 KB
- 2. OAuth in Detail/3. Authorization Code for Web Applications.srt 11.5 KB
- 5. Extending OAuth/4. Securely Authorizing the IoT with the OAuth Device Flow.srt 10.1 KB
- 2. OAuth in Detail/5. Implicit Flow for Single Page Applications.srt 9.8 KB
- 2. OAuth in Detail/11. Long-lived Access with Refresh Tokens.srt 8.1 KB
- 1. API Security 101/5. The Solution OAuth 2.0.srt 7.7 KB
- 1. API Security 101/7. OAuth A Misunderstood Protocol.srt 6.7 KB
- 5. Extending OAuth/7. Securing Microservices with Token Exchange.srt 5.2 KB
- 3. Best Practices for Native Applications/1. The Unique Issues of Native Applications.srt 5.1 KB
- 3. Best Practices for Native Applications/4. Not All Browsers Are Created Equally.srt 4.9 KB
- 1. API Security 101/2. A Solution Credential Sharing.srt 4.8 KB
- 2. OAuth in Detail/9. Resource Owner Password Credentials for No One.srt 4.4 KB
- 3. Best Practices for Native Applications/2. Dealing with Stolen Tokens Using PKCE.srt 4.0 KB
- 5. Extending OAuth/6. Combining SAML and OAuth with the SAML Assertion Grant.srt 3.9 KB
- 1. API Security 101/1. A Problem of API Authorization.srt 3.8 KB
- 3. Best Practices for Native Applications/3. Choosing the Best Redirect URI.srt 3.7 KB
- 4. Best Practices for Browser-based Applications/1. The Security Profile of a Browser-based Application.srt 3.7 KB
- 2. OAuth in Detail/7. Client Credentials for Machines.srt 3.6 KB
- 4. Best Practices for Browser-based Applications/3. Avoid OAuth with SameSite Cookies.srt 3.1 KB
- 2. OAuth in Detail/4. Demo Authorization Code for Web Applications.srt 3.1 KB
- 1. API Security 101/4. A Solution API Keys.srt 3.0 KB
- 4. Best Practices for Browser-based Applications/2. OAuth within the Browser.srt 2.8 KB
- 5. Extending OAuth/5. Demo Device Flow in Action.srt 2.7 KB
- 3. Best Practices for Native Applications/5. Demo OAuth for Native Applications in Action.srt 2.7 KB
- 3. Best Practices for Native Applications/6. Summary.srt 2.7 KB
- 5. Extending OAuth/8. Summary.srt 2.5 KB
- content.txt 2.5 KB
- 2. OAuth in Detail/13. Choosing the Right Response Mode.srt 2.4 KB
- 5. Extending OAuth/3. Automatically Configuring Clients with OAuth Metadata.srt 2.4 KB
- 1. API Security 101/6. Demo A Very Typical OAuth Flow.srt 2.2 KB
- 1. API Security 101/0. Introduction.srt 2.1 KB
- 0. Course Overview/0. Course Overview.srt 2.1 KB
- 2. OAuth in Detail/15. Simplifying OAuth with OAuth 2.1.srt 2.0 KB
- 2. OAuth in Detail/16. Summary.srt 2.0 KB
- 5. Extending OAuth/2. Demo Identity with OpenID Connect.srt 1.9 KB
- 2. OAuth in Detail/14. When Things Go Wrong.srt 1.8 KB
- 2. OAuth in Detail/12. Demo Long-lived Access with Refresh Tokens.srt 1.8 KB
- 2. OAuth in Detail/6. Demo Implicit Flow for Single Page Applications.srt 1.6 KB
- 1. API Security 101/3. A Solution Cookies.srt 1.5 KB
- 2. OAuth in Detail/1. Protocol Endpoints.srt 1.5 KB
- 4. Best Practices for Browser-based Applications/4. Secure Browser-based Applications with Backend for Frontend.srt 1.5 KB
- 2. OAuth in Detail/0. Introduction.srt 1.5 KB
- 2. OAuth in Detail/2. What Is a Scope.srt 1.4 KB
- 4. Best Practices for Browser-based Applications/5. Summary.srt 1.4 KB
- 5. Extending OAuth/0. Introduction.srt 1.3 KB
- 3. Best Practices for Native Applications/0. Introduction.srt 1.3 KB
- 4. Best Practices for Browser-based Applications/0. Introduction.srt 1.3 KB
- 1. API Security 101/8. Summary.srt 1.1 KB
- 2. OAuth in Detail/10. Demo Resource Owner Password Credentials for No One.srt 1006 bytes
- 2. OAuth in Detail/8. Demo Client Credentials for Machines.srt 859 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.