Richer J., Sanso A. - OAuth 2 in Action [2017, PDF, ENG]

Страницы:  1
Ответить
 

Osco do Casco

VIP (Заслуженный)

Стаж: 16 лет 5 месяцев

Сообщений: 13792

Osco do Casco · 14-Дек-25 05:43 (22 часа назад, ред. 14-Дек-25 05:44)

OAuth 2 in Action
Год издания: 2017
Автор: Richer J., Sanso A.
Издательство: Manning
ISBN: 978-1617293276
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 362
Описание: OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.
Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.
OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.
What's Inside
- Covers OAuth 2 protocol and design
- Authorization with OAuth 2
- OpenID Connect and User-Managed Access
- Implementation risks
- JOSE, introspection, revocation, and registration
- Protecting and accessing REST APIs
- About the Reader
Примеры страниц (скриншоты)
Оглавление
Part 1 First steps 1
1. What is OAuth 2.0 and why should you care? 3
2. The OAuth dance 21
Part 2 Building an OAuth 2 environment 41
3. Building a simple OAuth client 43
4. Building a simple OAuth protected resource 59
5. Building a simple OAuth authorization server 75
6. OAuth 2.0 in the real world 93
Part 3 OAuth 2 implementation and vulnerabilities 119
7. Common client vulnerabilities 121
8. Common protected resources vulnerabilities 138
9. Common authorization server vulnerabilities 154
10. Common OAuth token vulnerabilities 168
Part 4 Taking OAuth further 179
11. OAuth tokens 181
12. Dynamic client registration 208
13. User authentication with OAuth 2.0 236
14. Protocols and profiles using OAuth 2.0 262
15. Beyond bearer tokens 282
16. Summary and conclusions 298
Download
Rutracker.org не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм
Как скачивать? (для скачивания .torrent файлов необходима регистрация)
[Профиль]  [ЛС] 
 
Ответить
Loading...
Error