Pluralsight - Getting Started with OAuth 2.0 by Scott Brady
    
    File List
    
        
            
                
                    - 5. Extending OAuth/1. OAuth + Identity with OpenID Connect.mp4  12.3 MB
- 2. OAuth in Detail/3. Authorization Code for Web Applications.mp4  10.8 MB
- 5. Extending OAuth/4. Securely Authorizing the IoT with the OAuth Device Flow.mp4  10.7 MB
- oauth-2-getting-started.zip  10.5 MB
- 2. OAuth in Detail/5. Implicit Flow for Single Page Applications.mp4  8.7 MB
- 2. OAuth in Detail/11. Long-lived Access with Refresh Tokens.mp4  8.3 MB
- 1. API Security 101/5. The Solution OAuth 2.0.mp4  8.2 MB
- 1. API Security 101/7. OAuth A Misunderstood Protocol.mp4  7.5 MB
- 5. Extending OAuth/7. Securing Microservices with Token Exchange.mp4  6.6 MB
- 2. OAuth in Detail/4. Demo Authorization Code for Web Applications.mp4  4.9 MB
- 3. Best Practices for Native Applications/4. Not All Browsers Are Created Equally.mp4  4.8 MB
- 1. API Security 101/2. A Solution Credential Sharing.mp4  4.7 MB
- 3. Best Practices for Native Applications/1. The Unique Issues of Native Applications.mp4  4.6 MB
- 5. Extending OAuth/6. Combining SAML and OAuth with the SAML Assertion Grant.mp4  4.5 MB
- 2. OAuth in Detail/9. Resource Owner Password Credentials for No One.mp4  4.4 MB
- 5. Extending OAuth/5. Demo Device Flow in Action.mp4  4.3 MB
- 3. Best Practices for Native Applications/2. Dealing with Stolen Tokens Using PKCE.mp4  4.2 MB
- 4. Best Practices for Browser-based Applications/1. The Security Profile of a Browser-based Application.mp4  3.5 MB
- 2. OAuth in Detail/7. Client Credentials for Machines.mp4  3.4 MB
- 0. Course Overview/0. Course Overview.mp4  3.3 MB
- 2. OAuth in Detail/12. Demo Long-lived Access with Refresh Tokens.mp4  3.2 MB
- 1. API Security 101/1. A Problem of API Authorization.mp4  3.1 MB
- 4. Best Practices for Browser-based Applications/2. OAuth within the Browser.mp4  3.0 MB
- 3. Best Practices for Native Applications/5. Demo OAuth for Native Applications in Action.mp4  2.9 MB
- 3. Best Practices for Native Applications/3. Choosing the Best Redirect URI.mp4  2.8 MB
- 5. Extending OAuth/8. Summary.mp4  2.8 MB
- 5. Extending OAuth/2. Demo Identity with OpenID Connect.mp4  2.8 MB
- 3. Best Practices for Native Applications/6. Summary.mp4  2.7 MB
- 5. Extending OAuth/3. Automatically Configuring Clients with OAuth Metadata.mp4  2.6 MB
- 4. Best Practices for Browser-based Applications/3. Avoid OAuth with SameSite Cookies.mp4  2.6 MB
- 1. API Security 101/6. Demo A Very Typical OAuth Flow.mp4  2.4 MB
- 1. API Security 101/4. A Solution API Keys.mp4  2.4 MB
- 2. OAuth in Detail/6. Demo Implicit Flow for Single Page Applications.mp4  2.3 MB
- 2. OAuth in Detail/13. Choosing the Right Response Mode.mp4  2.3 MB
- 2. OAuth in Detail/16. Summary.mp4  2.2 MB
- 2. OAuth in Detail/15. Simplifying OAuth with OAuth 2.1.mp4  2.1 MB
- 1. API Security 101/0. Introduction.mp4  2.0 MB
- 2. OAuth in Detail/14. When Things Go Wrong.mp4  1.9 MB
- 2. OAuth in Detail/1. Protocol Endpoints.mp4  1.8 MB
- 4. Best Practices for Browser-based Applications/4. Secure Browser-based Applications with Backend for Frontend.mp4  1.5 MB
- 3. Best Practices for Native Applications/0. Introduction.mp4  1.5 MB
- 2. OAuth in Detail/0. Introduction.mp4  1.5 MB
- 5. Extending OAuth/0. Introduction.mp4  1.4 MB
- 4. Best Practices for Browser-based Applications/5. Summary.mp4  1.4 MB
- 4. Best Practices for Browser-based Applications/0. Introduction.mp4  1.3 MB
- 1. API Security 101/3. A Solution Cookies.mp4  1.3 MB
- 2. OAuth in Detail/10. Demo Resource Owner Password Credentials for No One.mp4  1.3 MB
- 2. OAuth in Detail/2. What Is a Scope.mp4  1.2 MB
- 1. API Security 101/8. Summary.mp4  1.2 MB
- 2. OAuth in Detail/8. Demo Client Credentials for Machines.mp4  1.0 MB
- 5. Extending OAuth/1. OAuth + Identity with OpenID Connect.srt  11.9 KB
- 2. OAuth in Detail/3. Authorization Code for Web Applications.srt  11.5 KB
- 5. Extending OAuth/4. Securely Authorizing the IoT with the OAuth Device Flow.srt  10.1 KB
- 2. OAuth in Detail/5. Implicit Flow for Single Page Applications.srt  9.8 KB
- 2. OAuth in Detail/11. Long-lived Access with Refresh Tokens.srt  8.1 KB
- 1. API Security 101/5. The Solution OAuth 2.0.srt  7.7 KB
- 1. API Security 101/7. OAuth A Misunderstood Protocol.srt  6.7 KB
- 5. Extending OAuth/7. Securing Microservices with Token Exchange.srt  5.2 KB
- 3. Best Practices for Native Applications/1. The Unique Issues of Native Applications.srt  5.1 KB
- 3. Best Practices for Native Applications/4. Not All Browsers Are Created Equally.srt  4.9 KB
- 1. API Security 101/2. A Solution Credential Sharing.srt  4.8 KB
- 2. OAuth in Detail/9. Resource Owner Password Credentials for No One.srt  4.4 KB
- 3. Best Practices for Native Applications/2. Dealing with Stolen Tokens Using PKCE.srt  4.0 KB
- 5. Extending OAuth/6. Combining SAML and OAuth with the SAML Assertion Grant.srt  3.9 KB
- 1. API Security 101/1. A Problem of API Authorization.srt  3.8 KB
- 3. Best Practices for Native Applications/3. Choosing the Best Redirect URI.srt  3.7 KB
- 4. Best Practices for Browser-based Applications/1. The Security Profile of a Browser-based Application.srt  3.7 KB
- 2. OAuth in Detail/7. Client Credentials for Machines.srt  3.6 KB
- 4. Best Practices for Browser-based Applications/3. Avoid OAuth with SameSite Cookies.srt  3.1 KB
- 2. OAuth in Detail/4. Demo Authorization Code for Web Applications.srt  3.1 KB
- 1. API Security 101/4. A Solution API Keys.srt  3.0 KB
- 4. Best Practices for Browser-based Applications/2. OAuth within the Browser.srt  2.8 KB
- 5. Extending OAuth/5. Demo Device Flow in Action.srt  2.7 KB
- 3. Best Practices for Native Applications/5. Demo OAuth for Native Applications in Action.srt  2.7 KB
- 3. Best Practices for Native Applications/6. Summary.srt  2.7 KB
- 5. Extending OAuth/8. Summary.srt  2.5 KB
- content.txt  2.5 KB
- 2. OAuth in Detail/13. Choosing the Right Response Mode.srt  2.4 KB
- 5. Extending OAuth/3. Automatically Configuring Clients with OAuth Metadata.srt  2.4 KB
- 1. API Security 101/6. Demo A Very Typical OAuth Flow.srt  2.2 KB
- 1. API Security 101/0. Introduction.srt  2.1 KB
- 0. Course Overview/0. Course Overview.srt  2.1 KB
- 2. OAuth in Detail/15. Simplifying OAuth with OAuth 2.1.srt  2.0 KB
- 2. OAuth in Detail/16. Summary.srt  2.0 KB
- 5. Extending OAuth/2. Demo Identity with OpenID Connect.srt  1.9 KB
- 2. OAuth in Detail/14. When Things Go Wrong.srt  1.8 KB
- 2. OAuth in Detail/12. Demo Long-lived Access with Refresh Tokens.srt  1.8 KB
- 2. OAuth in Detail/6. Demo Implicit Flow for Single Page Applications.srt  1.6 KB
- 1. API Security 101/3. A Solution Cookies.srt  1.5 KB
- 2. OAuth in Detail/1. Protocol Endpoints.srt  1.5 KB
- 4. Best Practices for Browser-based Applications/4. Secure Browser-based Applications with Backend for Frontend.srt  1.5 KB
- 2. OAuth in Detail/0. Introduction.srt  1.5 KB
- 2. OAuth in Detail/2. What Is a Scope.srt  1.4 KB
- 4. Best Practices for Browser-based Applications/5. Summary.srt  1.4 KB
- 5. Extending OAuth/0. Introduction.srt  1.3 KB
- 3. Best Practices for Native Applications/0. Introduction.srt  1.3 KB
- 4. Best Practices for Browser-based Applications/0. Introduction.srt  1.3 KB
- 1. API Security 101/8. Summary.srt  1.1 KB
- 2. OAuth in Detail/10. Demo Resource Owner Password Credentials for No One.srt  1006 bytes
- 2. OAuth in Detail/8. Demo Client Credentials for Machines.srt  859 bytes
 
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.