Software Engineering Radio - the podcast for professional software developers

Episode 376: Justin Richer On API Security with OAuth 2

20 snips
Aug 13, 2019
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
OAuth 2 - What's the Difference?
02:09 • 5min
3
What Is OAuth and How Does It Work?
07:02 • 2min
4
Do You Really Need to Change Your Passwords?
08:33 • 2min
5
The Key Strengths of OAuth Token Based Models
10:17 • 2min
6
What's Going on in the Financial Industry?
12:04 • 3min
7
What's the Nature of Trust?
14:55 • 2min
8
What Is OAuth 2dance?
16:31 • 4min
9
Photo Storage API Authentication
20:46 • 2min
10
How Does Dropbox Prove It's Legitimate?
22:53 • 3min
11
What's the Secret of a Client Application?
26:14 • 2min
12
Mobile Apps - What's the Difference?
28:04 • 3min
13
What's the Best Way to Deal With a Mobile Application?
30:57 • 3min
14
OAuth 2 - Dynamic Client Registration Protocol
33:31 • 2min
15
OAuth 2 - What Options Would You Have to Not Do?
35:37 • 3min
16
Slash Summer
38:32 • 1min
17
Open ID Connect and OAuth Two - What's the Difference?
40:00 • 5min
18
Don't Re-Invent Wheels
45:28 • 2min
19
OAuth 2 Security - Is the Client a Dumb Carrier of It?
47:38 • 3min
20
RFC - The Jot Specification
50:48 • 2min
21
The Drawbacks of Jotz
52:41 • 3min
22
So You Could Sign a Jot With Base 64 URL Encoded JSON?
55:32 • 2min
23
What's the Drawback of OAuth 2?
57:36 • 4min
24
I Just Got a Certificate, Is It Any Good?
01:02:06 • 2min
25
Using the Authorization Code Flow for JavaScript Applications
01:03:46 • 4min
26
OAuth 2 Client Credentials Grant Type
01:07:25 • 1min
27
Single Page Apps - One Lesson You Could Teach Every Developer
01:08:53 • 5min