Companies Home Search Profile

Introduction to Oauth

Focused View

Infini Tech

55:14

16 View
  • 1. Introduction.mp4
    02:33
  • 2. Authorization Quick Overview.mp4
    05:37
  • 3. Oauth Authorization Methods.mp4
    14:12
  • 4. Oauth Bearer Tokens.mp4
    19:05
  • 5. Oauth Refresh Tokens.mp4
    02:56
  • 6. Oauth Client Types and registration.mp4
    10:51
  • 7. Summary.html
  • Description


    Understand the Oauth protocol and how it works

    What You'll Learn?


    • Understand the core concepts of OAuth 2.0 like delegated authorization, roles of clients and servers, and access tokens
    • Learn about common OAuth 2.0 authorization flows including authorization code grant and implicit grant
    • Grasp how bearer tokens work, their usage, and security considerations
    • Know how refresh tokens allow renewed access without reauthenticating
    • Gain knowledge of OpenID Connect identity tokens built on OAuth 2.0 foundations
    • Understand the need for Oauth PKCE to thwart common attacks on Oauth2.0

    Who is this for?


  • Cybersecurity engineers and analysts interested in identity management
  • IT professionals working on identity and access management
  • Anyone seeking a solid grasp of OAuth and OpenID Connect fundamentals
  • What You Need to Know?


  • Basic understanding of authentication and authorization concepts
  • Ability to understand technical specifications and documentation
  • More details


    Description

    This course provides an introduction to OAuth 2.0 and OpenID Connect, two important protocols for authorization and authentication. We will cover the basics of OAuth 2.0, including the delegated authorization concept and the roles of the client, resource owner, authorization server, and protected resources. We will explore OAuth authorization methods like authorization code grant, implicit grant, resource owner credentials, and client credentials. We will understand the process of how an end user grants access to a third party application in order to delegate authorization. Additionally, we will discuss bearer tokens, their usage, and security considerations that come with bearer tokens. Refresh tokens will also be covered, including their longer lifespan and revocation by the authorization server.

    For OpenID Connect, we will learn how it builds on OAuth 2.0 to enable client verification of user identity through ID tokens. We will also cover client registration, which provides metadata to the authorization server, and client types like confidential and public. Other key topics include client profiles such as web applications and native applications. Through lectures, hands-on examples, and real-world use cases, students will gain foundational knowledge of OAuth 2.0 and OpenID Connect to apply to real-world application development scenarios.

    Who this course is for:

    • Cybersecurity engineers and analysts interested in identity management
    • IT professionals working on identity and access management
    • Anyone seeking a solid grasp of OAuth and OpenID Connect fundamentals

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Classes offered by instructor with industry proven experience. He started his career as a help desk technician and progressed to desktop support then systems administration. With interest into networking, he obtained his CCNA and CCNP. After obtaining his certification he moved to a technical manager position managing both systems and network infrastructure.  Technical hands-on passion led him to move back to the ranks and become an engineer honing his skills in the network security field. He mastered the Cisco ASA, Palo Alto firewalls and other technologies. "It is difficult and expensive to get hands on material covering the latest products like Sourcefire, PaloAlto, and Fortinet. I am making those classes to give students the education they need at a reasonable cost - with practical experience backing it. I try to go the extra step showing how the product works and show configuration by providing an example that works in real life. Not just covering the concepts."
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 6
    • duration 55:14
    • Release Date 2023/12/25