While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant types and the required flows while securely protecting your secrets is challenging at best and catastrophic at worst. Fundamentally, professionals often struggle with OAuth because they misunderstand what it is, what use cases it is particularly good and bad at, and how to integrate it smoothly and safely into their systems. In this course, Keith Casey reviews the basics of OAuth 2.0 and OpenID Connect and shows how to use them to authenticate your applications. He covers tokens and scopes; designing and building the key flows; common security considerations; and more.
Learn More- Career Communities
- Identity Resources
- Career Planning
- Access Career Tools
- Build Skills at Denison Edge
- Build Your Resume and Cover Letter
- Search for an Internship or Job
- Network with Confidence
- Leverage Winter Break
- Participate in the Denison Internship Program
- Prepare for an Interview
- Plan for Graduate School
- Research Industries and Companies
- Utilize Financial Resources
- Alumni
- Academic Partnerships
- Meet The Team
- Student Employment