The Changelog: Software Development, Open Source cover image

OAuth, "It's complicated." (Interview)

The Changelog: Software Development, Open Source

00:00

Securing OAuth: From Implicit Flow to Pixie

This chapter explores the vulnerabilities of the implicit flow in OAuth, highlighting how access tokens can be compromised through front-channel communications. It introduces the enhanced authorization code flow with Pixie, which addresses security concerns by leveraging a back channel for more secure token exchanges.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app