TorBT - Torrents and Magnet Links Search Engine

Pluralsight - Getting Started with OAuth 2.0 by Scott Brady

File Name
Size
0. Course Overview/0. Course Overview.mp4
3.3 MB
0. Course Overview/0. Course Overview.srt
2.1 kB
1. API Security 101/0. Introduction.mp4
2.0 MB
1. API Security 101/0. Introduction.srt
2.1 kB
1. API Security 101/1. A Problem of API Authorization.mp4
3.1 MB
1. API Security 101/1. A Problem of API Authorization.srt
3.8 kB
1. API Security 101/2. A Solution Credential Sharing.mp4
4.7 MB
1. API Security 101/2. A Solution Credential Sharing.srt
4.8 kB
1. API Security 101/3. A Solution Cookies.mp4
1.3 MB
1. API Security 101/3. A Solution Cookies.srt
1.5 kB
1. API Security 101/4. A Solution API Keys.mp4
2.4 MB
1. API Security 101/4. A Solution API Keys.srt
3.0 kB
1. API Security 101/5. The Solution OAuth 2.0.mp4
8.2 MB
1. API Security 101/5. The Solution OAuth 2.0.srt
7.7 kB
1. API Security 101/6. Demo A Very Typical OAuth Flow.mp4
2.4 MB
1. API Security 101/6. Demo A Very Typical OAuth Flow.srt
2.2 kB
1. API Security 101/7. OAuth A Misunderstood Protocol.mp4
7.5 MB
1. API Security 101/7. OAuth A Misunderstood Protocol.srt
6.7 kB
1. API Security 101/8. Summary.mp4
1.2 MB
1. API Security 101/8. Summary.srt
1.1 kB
2. OAuth in Detail/0. Introduction.mp4
1.5 MB
2. OAuth in Detail/0. Introduction.srt
1.5 kB
2. OAuth in Detail/1. Protocol Endpoints.mp4
1.8 MB
2. OAuth in Detail/1. Protocol Endpoints.srt
1.5 kB
2. OAuth in Detail/10. Demo Resource Owner Password Credentials for No One.mp4
1.3 MB
2. OAuth in Detail/10. Demo Resource Owner Password Credentials for No One.srt
1006 B
2. OAuth in Detail/11. Long-lived Access with Refresh Tokens.mp4
8.3 MB
2. OAuth in Detail/11. Long-lived Access with Refresh Tokens.srt
8.1 kB
2. OAuth in Detail/12. Demo Long-lived Access with Refresh Tokens.mp4
3.2 MB
2. OAuth in Detail/12. Demo Long-lived Access with Refresh Tokens.srt
1.8 kB
2. OAuth in Detail/13. Choosing the Right Response Mode.mp4
2.3 MB
2. OAuth in Detail/13. Choosing the Right Response Mode.srt
2.4 kB
2. OAuth in Detail/14. When Things Go Wrong.mp4
1.9 MB
2. OAuth in Detail/14. When Things Go Wrong.srt
1.8 kB
2. OAuth in Detail/15. Simplifying OAuth with OAuth 2.1.mp4
2.1 MB
2. OAuth in Detail/15. Simplifying OAuth with OAuth 2.1.srt
2.0 kB
2. OAuth in Detail/16. Summary.mp4
2.2 MB
2. OAuth in Detail/16. Summary.srt
2.0 kB
2. OAuth in Detail/2. What Is a Scope.mp4
1.2 MB
2. OAuth in Detail/2. What Is a Scope.srt
1.4 kB
2. OAuth in Detail/3. Authorization Code for Web Applications.mp4
11 MB
2. OAuth in Detail/3. Authorization Code for Web Applications.srt
12 kB
2. OAuth in Detail/4. Demo Authorization Code for Web Applications.mp4
4.9 MB
2. OAuth in Detail/4. Demo Authorization Code for Web Applications.srt
3.1 kB
2. OAuth in Detail/5. Implicit Flow for Single Page Applications.mp4
8.7 MB
2. OAuth in Detail/5. Implicit Flow for Single Page Applications.srt
9.8 kB
2. OAuth in Detail/6. Demo Implicit Flow for Single Page Applications.mp4
2.3 MB
2. OAuth in Detail/6. Demo Implicit Flow for Single Page Applications.srt
1.6 kB
2. OAuth in Detail/7. Client Credentials for Machines.mp4
3.4 MB
2. OAuth in Detail/7. Client Credentials for Machines.srt
3.6 kB
2. OAuth in Detail/8. Demo Client Credentials for Machines.mp4
1.0 MB
2. OAuth in Detail/8. Demo Client Credentials for Machines.srt
859 B
2. OAuth in Detail/9. Resource Owner Password Credentials for No One.mp4
4.4 MB
2. OAuth in Detail/9. Resource Owner Password Credentials for No One.srt
4.4 kB
3. Best Practices for Native Applications/0. Introduction.mp4
1.5 MB
3. Best Practices for Native Applications/0. Introduction.srt
1.3 kB
3. Best Practices for Native Applications/1. The Unique Issues of Native Applications.mp4
4.6 MB
3. Best Practices for Native Applications/1. The Unique Issues of Native Applications.srt
5.1 kB
3. Best Practices for Native Applications/2. Dealing with Stolen Tokens Using PKCE.mp4
4.2 MB
3. Best Practices for Native Applications/2. Dealing with Stolen Tokens Using PKCE.srt
4.0 kB
3. Best Practices for Native Applications/3. Choosing the Best Redirect URI.mp4
2.8 MB
3. Best Practices for Native Applications/3. Choosing the Best Redirect URI.srt
3.7 kB
3. Best Practices for Native Applications/4. Not All Browsers Are Created Equally.mp4
4.8 MB
3. Best Practices for Native Applications/4. Not All Browsers Are Created Equally.srt
4.9 kB
3. Best Practices for Native Applications/5. Demo OAuth for Native Applications in Action.mp4
2.9 MB
3. Best Practices for Native Applications/5. Demo OAuth for Native Applications in Action.srt
2.7 kB
3. Best Practices for Native Applications/6. Summary.mp4
2.7 MB
3. Best Practices for Native Applications/6. Summary.srt
2.7 kB
4. Best Practices for Browser-based Applications/0. Introduction.mp4
1.3 MB
4. Best Practices for Browser-based Applications/0. Introduction.srt
1.3 kB
4. Best Practices for Browser-based Applications/1. The Security Profile of a Browser-based Application.mp4
3.5 MB
4. Best Practices for Browser-based Applications/1. The Security Profile of a Browser-based Application.srt
3.7 kB
4. Best Practices for Browser-based Applications/2. OAuth within the Browser.mp4
3.0 MB
4. Best Practices for Browser-based Applications/2. OAuth within the Browser.srt
2.8 kB
4. Best Practices for Browser-based Applications/3. Avoid OAuth with SameSite Cookies.mp4
2.6 MB
4. Best Practices for Browser-based Applications/3. Avoid OAuth with SameSite Cookies.srt
3.1 kB
4. Best Practices for Browser-based Applications/4. Secure Browser-based Applications with Backend for Frontend.mp4
1.5 MB
4. Best Practices for Browser-based Applications/4. Secure Browser-based Applications with Backend for Frontend.srt
1.5 kB
4. Best Practices for Browser-based Applications/5. Summary.mp4
1.4 MB
4. Best Practices for Browser-based Applications/5. Summary.srt
1.4 kB
5. Extending OAuth/0. Introduction.mp4
1.4 MB
5. Extending OAuth/0. Introduction.srt
1.3 kB
5. Extending OAuth/1. OAuth + Identity with OpenID Connect.mp4
12 MB
5. Extending OAuth/1. OAuth + Identity with OpenID Connect.srt
12 kB
5. Extending OAuth/2. Demo Identity with OpenID Connect.mp4
2.8 MB
5. Extending OAuth/2. Demo Identity with OpenID Connect.srt
1.9 kB
5. Extending OAuth/3. Automatically Configuring Clients with OAuth Metadata.mp4
2.6 MB
5. Extending OAuth/3. Automatically Configuring Clients with OAuth Metadata.srt
2.4 kB
5. Extending OAuth/4. Securely Authorizing the IoT with the OAuth Device Flow.mp4
11 MB
5. Extending OAuth/4. Securely Authorizing the IoT with the OAuth Device Flow.srt
10 kB
5. Extending OAuth/5. Demo Device Flow in Action.mp4
4.3 MB
5. Extending OAuth/5. Demo Device Flow in Action.srt
2.7 kB
5. Extending OAuth/6. Combining SAML and OAuth with the SAML Assertion Grant.mp4
4.5 MB
5. Extending OAuth/6. Combining SAML and OAuth with the SAML Assertion Grant.srt
3.9 kB
5. Extending OAuth/7. Securing Microservices with Token Exchange.mp4
6.6 MB
5. Extending OAuth/7. Securing Microservices with Token Exchange.srt
5.2 kB
5. Extending OAuth/8. Summary.mp4
2.8 MB
5. Extending OAuth/8. Summary.srt
2.5 kB
content.txt
2.5 kB
oauth-2-getting-started.zip
10 MB