Autoplay
Autocomplete
Previous Lesson
Complete and Continue
OAuth2 & OpenID Core: Best Practices For Implementers
Section 0: Introduction
Introduction
Section 1: Abstract Concepts
1. Definition: Identity (1:00)
2. Definition: User Authentication (2:26)
3. Definition: API Authentication (2:25)
4. Definition: Multi-Factor Authentication (1:26)
5. Definition: Authorization (1:16)
6. Comparing Authentication and Authorization (2:28)
Quiz 1: Recap Quiz: Abstract Concepts
Postface: Abstract Concepts
Section 2: Compared to SAML
7. Comparing Standards: OAuth2 v SAML (5:37)
Quiz 2: Recap Quiz: Compared to SAML
Postface: Compared to SAML
Section 3: Anatomy of OAuth2
8. OAuth2: Terminology (4:21)
9. OAuth2: Client Registration (5:22)
10. OAuth2: Grant Types Introduction (2:40)
Quiz 3: Recap Quiz: Anatomy of OAuth2
Postface: Anatomy of OAuth2
Section 4: OAuth2 Grant Types
11. OAuth2: Authorization Code Grant (5:24)
12. OAuth2: Resource Server (side note) (0:50)
13. OAuth2: Authorization Code + PKCE Grant (3:48)
14. OAuth2: Implicit Grant (1:57)
15. OAuth2: PKCE v Implicit (2:43)
16. OAuth2: Resource Owner Password Grant (1:27)
17. OAuth2: Client Credentials Grant (2:28)
18. OAuth2: Refresh Token Grant (3:47)
Postface: OAuth2 Grant Types
Section 5: OAuth2 Error Handling
19. OAuth2: Error Responses (1:55)
20. Network Errors: Front Channel (side note) (1:06)
21. Network Errors: Back Channel (side note) (1:35)
Quiz 4: Recap Quiz: OAuth2 Error Handling
Postface: OAuth2 Error Handling
Section 6: OpenID Connect Core
22. Comparing Standards 2: OpenID v SAML (2:19)
23. OIDC Core: User View and Endpoints (1:26)
24. OIDC Core: JWT (4:14)
25. OIDC Core: ID Token (4:36)
26. OIDC Core: Grant Types (2:26)
27. OIDC Core: Client Authentication (1:24)
Quiz 5: Recap Quiz: OpenID Connect Core
Postface: OpenID Connect Core
Section 7: Security Considerations
28. General Security Considerations (4:18)
29. Security Considerations: Front Channel (1:07)
30. Security Considerations: Back Channel (1:18)
Quiz 6: Recap Quiz: Security Considerations
Postface: Security Considerations
Section 8: Further Recommendations
31. General Recommendations (4:02)
32. Recommendations: Clients (2:37)
33. Recommendations: Providers (Servers) (4:03)
Postface: Further Recommendations
18. OAuth2: Refresh Token Grant
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 340+ Top Cyber Security Courses.
UPGRADE NOW