About This BookLearn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Facebook, Google, Instagram, Slack, Box, and moreMaster the finer details of this complex protocol to maximize the potential of your application while maintaining the utmost of securityStep through the construction of a real-world working application that logs you in with your Facebook account to create a compelling infographic about the most important person in the world—you!Who This Book Is ForIf you are an application developer, software architect, security engineer, or even casual programmer looking to leverage the power of OAuth 2.0, this book is for you. A basic knowledge of programming and OAuth 2.0 is recommended.
What You Will LearnDiscover the power and prevalence of OAuth 2.0 and use it to improve your application's capabilitiesStep through the process of creating a real-world application that interacts with Facebook using OAuth 2.0Examine the various workflows described by the specification, looking at what they are and when to use themGet to know about the many security considerations involved in creating an application that interacts with other service providersDevelop your debugging skills with dedicated pages for tooling and troubleshootingExpand your knowledge of OAuth 2.0 by discovering the many ways OAuth 2.0 can be extendedBuild your own rich, powerful applications by leveraging world-class technologies from companies around the worldIn DetailOAuth 2.0 is a powerful authorization framework that enables your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application.
At the start of this book, you will learn what OAuth 2.0 is, how it works, and the steps involved in creating an OAuth 2.0 application. You will first look at the process of registering your client application. Following this, you will explore the different supported workflows, their differences, and when they should be used. Once this groundwork is laid, you will put that knowledge to use by creating a sample application that talks to Facebook using OAuth 2.0.
By the end of the book, you will know how to make a secure and robust OAuth 2.0 application. You will explore different tools and effective methods for debugging. In addition, you will look at important security considerations for your application. Finally, you will understand the different implications of making a native mobile application versus a traditional web application.
Molto chiaro, con esempi ben scritti e comprensibili.
A volte gli schemi che usa non sono chiarissimi, ma fortunatamente spiega gli stessi flussi in più modi diversi.
La maggior parte del libro è incentrata sull'autenticazione "3-legs", ma sul finale accenna anche ad altri tipi di autenticazione.
Un po' sbilanciato verso la visione dalla parte del client, mentre il lato server è lasciato un po' in disparte, anche se fornisce abbastanza informazioni da poter cercare altrove spiegazioni più dettagliate.