OAuth 2 scope design for security

Manning Publications
Manning Publications
3.1 هزار بار بازدید - 3 سال پیش - Check out Neil Madden's book
Check out Neil Madden's book 📖  API Security in Action  | http://mng.bz/jj7a 📖   Save 40% with ⭐  DISCOUNT CODE: tcapis21 ⭐  In this talk, you’ll learn best practices for securing access to resources using OAuth 2 scopes and when other technologies may be a better fit. OAuth 2 is very widely used for securing access to APIs. Access to resources is restricted based on the concept of “scope”. But what is a scope? How does it differ from permissions or roles? Find the answers here.

📚📚📚
API Security in Action  | http://mng.bz/jj7a
To save 40% use discount code: tcapis21
📚📚📚

About the book:
API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When you’re done, you’ll be able to create APIs that stand up to complex threat models and hostile environments.
3 سال پیش در تاریخ 1400/07/20 منتشر شده است.
3,123 بـار بازدید شده
... بیشتر