Skip to main content
DI

OAuth 2 in Action

Justin Richer

OAuth 2 in Action

Covers OAuth 2 protocol and its application

by Justin Richer, Antonio Sanso

4.5/5
Manning
2017
360 pages
ISBN: 978-1617293276

Summary

OAuth 2 in Action teaches you the practical use and deployment of OAuth 2 from the perspective of a client, authorization server, and resource server. You'll learn how to build an OAuth 2 ecosystem from scratch, understand the security implications, and implement it correctly in real-world scenarios.

Why Read This Book

The definitive hands-on guide to OAuth 2.0 implementation. Unlike specification documents, this book walks you through building every component of an OAuth 2 system, making abstract concepts concrete through practical code examples.

Key Takeaways

  • Complete understanding of the OAuth 2.0 authorization framework
  • How to implement authorization servers, clients, and protected resources
  • Security vulnerabilities in OAuth 2 and how to mitigate them
  • Token management including JWT and token introspection
  • OAuth 2.0 extensions including OpenID Connect and PKCE

Who Should Read This

Developers who need to implement OAuth 2.0 in their applications and want to deeply understand the protocol.

Backend DevelopersAPI EngineersSecurity Engineers

Frequently Asked Questions

What is "OAuth 2 in Action" about?

OAuth 2 in Action teaches you the practical use and deployment of OAuth 2 from the perspective of a client, authorization server, and resource server. You'll learn how to build an OAuth 2 ecosystem from scratch, understand the security implications, and implement it correctly in real-world scenarios.

Who should read "OAuth 2 in Action"?

Developers who need to implement OAuth 2.0 in their applications and want to deeply understand the protocol.

What are the key takeaways from "OAuth 2 in Action"?

Key takeaways include: Complete understanding of the OAuth 2.0 authorization framework; How to implement authorization servers, clients, and protected resources; Security vulnerabilities in OAuth 2 and how to mitigate them.

Related Books

Browse all