Jump to ratings and reviews
Rate this book

Mastering OAuth 2.0

Rate this book
About This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Facebook, Google, Instagram, Slack, Box, and moreMaster the finer details of this complex protocol to maximize the potential of your application while maintaining the utmost of securityStep through the construction of a real-world working application that logs you in with your Facebook account to create a compelling infographic about the most important person in the world—you!Who This Book Is ForIf you are an application developer, software architect, security engineer, or even casual programmer looking to leverage the power of OAuth 2.0, this book is for you. A basic knowledge of programming and OAuth 2.0 is recommended.

What You Will LearnDiscover the power and prevalence of OAuth 2.0 and use it to improve your application's capabilitiesStep through the process of creating a real-world application that interacts with Facebook using OAuth 2.0Examine the various workflows described by the specification, looking at what they are and when to use themGet to know about the many security considerations involved in creating an application that interacts with other service providersDevelop your debugging skills with dedicated pages for tooling and troubleshootingExpand your knowledge of OAuth 2.0 by discovering the many ways OAuth 2.0 can be extendedBuild your own rich, powerful applications by leveraging world-class technologies from companies around the worldIn DetailOAuth 2.0 is a powerful authorization framework that enables your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application.

At the start of this book, you will learn what OAuth 2.0 is, how it works, and the steps involved in creating an OAuth 2.0 application. You will first look at the process of registering your client application. Following this, you will explore the different supported workflows, their differences, and when they should be used. Once this groundwork is laid, you will put that knowledge to use by creating a sample application that talks to Facebook using OAuth 2.0.

By the end of the book, you will know how to make a secure and robust OAuth 2.0 application. You will explore different tools and effective methods for debugging. In addition, you will look at important security considerations for your application. Finally, you will understand the different implications of making a native mobile application versus a traditional web application.

347 pages, Kindle Edition

Published December 15, 2015

11 people are currently reading
21 people want to read

About the author

Charles Bihis

1 book1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (25%)
4 stars
4 (16%)
3 stars
12 (50%)
2 stars
2 (8%)
1 star
0 (0%)
Displaying 1 - 9 of 9 reviews
Profile Image for Akshay Vadher.
19 reviews
June 6, 2017
A minus one 🌟 for repeatative content and another minus for title, it says mastering OAuth2 while it is introduction to OAuth.

Other than that a good book for beginners. Covers majority of things for client side implementation with working example.
2 reviews
January 1, 2020
Easy explanation but lot of redundancy. Same diagram, same concept is explained multiple times.
1 review
February 5, 2017
This author obviously knows his stuff... great content, super informative.
1 review
February 10, 2017
This book provides a great introduction to OAuth 2. The author has clearly organized the book in a way for readers to easily learn and understand.
379 reviews10 followers
April 19, 2016
Molto chiaro, con esempi ben scritti e comprensibili.

A volte gli schemi che usa non sono chiarissimi, ma fortunatamente spiega gli stessi flussi in più modi diversi.

La maggior parte del libro è incentrata sull'autenticazione "3-legs", ma sul finale accenna anche ad altri tipi di autenticazione.

Un po' sbilanciato verso la visione dalla parte del client, mentre il lato server è lasciato un po' in disparte, anche se fornisce abbastanza informazioni da poter cercare altrove spiegazioni più dettagliate.
Profile Image for Human Being.
8 reviews
January 7, 2017
It's well organized.

The one thing I don't like about it is that many parts are repeated. Though, some may find this useful.

At the end, it's a good and comprehensive book to fully understand OAuth 2.0 Protocol.
Displaying 1 - 9 of 9 reviews

Can't find what you're looking for?

Get help and learn more about the design.