Ascolta tutto, gratis per 30 giorni

Approfitta dell'offerta e entra in un mondo di storie

  • Ascolta e leggi quanto vuoi
  • Oltre 400.000 titoli
  • Prova gratis per 30 giorni, poi 9.99€/mese
  • Disdici quando vuoi
  • Ascolta titoli esclusivi e Storytel Original
Prova Gratis
Device Banner Block 894x1036

OAuth 2.0 Cookbook: Protect your web applications using Spring Security

Lingua
Inglese
Format
Categoria

Non-fiction

Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies.

About This Book • Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.

• Use Spring Security and Spring Security OAuth2 to implement your own OAuth 2.0 provider

• Learn how to implement OAuth 2.0 native mobile clients for Android applications

Who This Book Is For

This book targets software engineers and security experts who are looking to develop their skills in API security and OAuth 2.0. Prior programming knowledge and a basic understanding of developing web applications are necessary. As this book's recipes mostly use Spring Security and Spring Security OAuth2, some prior experience with Spring Framework will be helpful.

What You Will Learn • Use Redis and relational databases to store issued access tokens and refresh tokens

• Access resources protected by the OAuth2 Provider using Spring Security

• Implement a web application that dynamically registers itself to the Authorization Server

• Improve the safety of your mobile client using dynamic client registration

• Protect your Android client with Proof Key for Code Exchange

• Protect the Authorization Server from invalid redirection

In Detail

OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.

The book starts by presenting you how to interact with some public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. You will also be able to implement your own OAuth 2.0 provider with Spring Security OAuth2. Next, the book will cover practical scenarios regarding some important OAuth 2.0 profiles such as Dynamic Client Registration, Token Introspection and how to revoke issued access tokens. You will then be introduced to the usage of JWT, OpenID Connect, and how to safely implement native mobile OAuth 2.0 Clients.

By the end of this book, you will be able to ensure that both the server and client are protected against common vulnerabilities.

Style and approach

With the help of real-world examples, this book provides step by step recipes for troubleshooting and extending your API security. The book also helps you with accessing and securing data on mobile, desktop, and cloud apps with OAuth 2.0.

© 2017 Packt Publishing (Ebook): 9781788290630

Data di uscita

Ebook: 18 ottobre 2017

Tag

    Potrebbero piacerti

    1. Clean Code: A Handbook of Agile Software Craftsmanship Robert C. Martin
    2. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    3. 97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners Multiple Authors
    4. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    5. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    6. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
    7. Computational Thinking Peter J. Denning
    8. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    9. The Art of Deception: Controlling the Human Element of Security William L. Simon
    10. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    11. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    12. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
    13. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
    14. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    15. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    16. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    17. Cybercrime Investigators Handbook Graeme Edwards
    18. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    19. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    20. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
    21. Software Development Fundamentals Introbooks Team
    22. Scrum Master Certification Preparation: Tips and Tactics for Passing Scrum Master Assessments Jimmy Mathew
    23. The Clean Coder: A Code of Conduct for Professional Programmers Robert C. Martin
    24. Once Upon an Algorithm: How Stories Explain Computing Martin Erwig
    25. Software Architecture: The Hard Parts: Modern Trade-Off Analyses for Distributed Architectures Neal Ford
    26. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    27. Clean Architecture: A Craftsman's Guide to Software Structure and Design Robert C. Martin
    28. Data Science John D. Kelleher
    29. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
    30. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    31. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    32. Cybersecurity All-in-One For Dummies Joseph Steinberg
    33. Ultimate Azure IaaS for Infrastructure Management Dean Cefola
    34. Google Cloud Cookbook: Practical Solutions for Building and Deploying Cloud Services, 1st Edition Rui Costa
    35. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
    36. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Kevin Mitnick
    37. Networking For Dummies (11th Edition): 11th Edition Doug Lowe
    38. Becoming a Neurosurgeon John Colapinto
    39. The Science of Positivity: Stop Negative Thought Patterns by Changing Your Brain Chemistry Loretta Graziano Breuning
    40. The Mind-Body Problem Jonathan Westphal
    41. Ethical Hacking for Beginners: HOW TO BUILD YOUR PEN TEST LAB FAST ATTILA KOVACS
    42. HBR's 10 Must Reads on Business Model Innovation (with featured article "Reinventing Your Business Model" by Mark W. Johnson, Clayton M. Christensen, and Henning Kagermann) Clayton M. Christensen
    43. Cyber Hacking: Wars in Virtual Space Scientific American

    Scegli il tuo piano

    • Più di 400.000 titoli

    • Kids Mode (accesso sicuro per bambini)

    • Scarica e ascolta offline

    • Disdici quando vuoi

    Il più popolare

    Unlimited

    La scelta migliore per 1 utente. Ascolta e leggi quanto vuoi.

    9.99 € /mese
    • 1 account

    • Ascolto illimitato

    • Disdici quando vuoi

    Prova ora

    Unlimited Annuale

    12 mesi al prezzo di 9. Ascolta e leggi quanto vuoi.

    89.99 € /anno
    Risparmia il 25%
    • 1 account

    • Ascolto illimitato

    • Disdici quando vuoi

    Prova ora

    Unlimited+

    Storie per tutta la famiglia. Entrate insieme in un mondo di storie.

    14.99 € /mese
    • 2 account

    • Ascolto illimitato

    • Disdici quando vuoi

    Prova ora

    Basic

    Per te che non sei un avido ascoltatore.

    6.49 € /mese
    • 1 account

    • 10 ore/mese

    • Disdici quando vuoi

    Prova ora