Skip to content

Latest commit

 

History

History
172 lines (145 loc) · 11.9 KB

oauth2.md

File metadata and controls

172 lines (145 loc) · 11.9 KB

Bookmarks tagged [oauth2]

https://blog.linuxserver.io/2020/08/26/setting-up-authelia/

This article details how SSO via Authelia can be easily set up using SWAG's preset Authelia confs.


https://github.com/IdentityModel/oidc-client-js/

OpenID Connect (OIDC) and OAuth2 protocol support for browser-based JavaScript applications


https://aaronparecki.com/oauth-2-simplified/

This post describes OAuth 2.0 in a simplified format to help developers and service providers implement the protocol. (


https://developer.okta.com/blog/2019/08/22/okta-authjs-pkce

In this post, you’ll learn some foundational concepts of OIDC and OAuth2. You’ll be guided through a simple SPA example written in Vue.js that starts with the older (now deprecated) Implicit flow and ...


https://auth0.com/docs/protocols/state-parameters

Authorization protocols provide a state parameter that allows you to restore the previous state of your application. The state parameter preserves some state objects set by the client in the Autho...


https://developer.okta.com/blog/2019/05/01/is-the-oauth-implicit-flow-dead

You may have heard some buzz recently about the OAuth 2.0 Implicit flow. The OAuth Working Group has published some new guidance around the Implicit flow and JavaScript-based apps, specifically that t...


https://www.janua.fr/pkce-support-with-keycloak-7-0/

PKCE support with Keycloak 7.0: Keycloak 7.0 has been released on Aug 25th 2019 with PKCE support. This represents a major breakthrough for all mobile apps to increase security and to mitigate malicio...


https://tools.ietf.org/html/rfc7636

OAuth 2.0 public clients utilizing the Authorization Code Grant are susceptible to the authorization code interception attack. This specification describes the attack as well as a technique to...


https://www.youtube.com/watch?v=g_aVPdwBTfw

In this talk you'll learn about the latest developments with the OAuth​ and OIDC​ specs directly from the standards group. The latest additions to the specs enable richer experiences and better secu...


https://medium.com/@mattmazzola/react-simple-auth-react-redux-oauth-2-0-de6ea9df0a63

I recently started working on a React project and was looking to add authentication support to it. As a long time Ember developer I expected there to be a standard community solution similar to ember-...


https://oidcdebugger.com/

Test and debug OpenID Connect requests. This free tool makes it easy to send requests and view responses.


https://www.youtube.com/watch?v=1N-xwmoN83w

Resource Server parts

The OAuth 2.0 Authorization Framework is elaborate, with several nuances and subtl...


https://spring.io/blog/2018/01/30/next-generation-oauth-2-0-support-with-spring-security

The current state of OAuth 2.0 Support, within the Spring projects portfolio, is spread out between Spring Security OAuth, Spring Cloud Security, Spring Boot 1.5.x, and the new support introduced in S...


https://www.youtube.com/watch?v=996OiexHze0

Developer Advocate Nate Barbettini breaks down OpenID and OAuth 2.0 in Plain English Find Nate's slides here: [https://speakerdeck.com/nbarbettini/oauth-and-openid-connect-in-plain-english](https://sp...


https://medium.com/@darutk/understanding-id-token-5f83f50fa02e

From an engineer's point of view, an abstract explanation like “ID Token is a token issued as a result of user authentication” is not so valuable because engineers cannot imagine how to implement ID T...


https://openid.net/connect/

OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Serve...


[User-Managed Access (UMA) Profile of OAuth

2.0](https://docs.kantarainitiative.org/uma/rec-uma-core.html)

https://docs.kantarainitiative.org/uma/rec-uma-core.html

User-Managed Access (UMA) is a profile of OAuth 2.0. UMA defines how resource owners can control protected-resource access by clients operated by arbitrary requesting parties, where the resources resi...


https://tools.ietf.org/html/rfc6750

This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the ...


https://tools.ietf.org/html/rfc6749

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either of a behalf of a resource owner by orchestrating an approval interaction bet...


https://www.youtube.com/watch?v=tj03NRM6SP8

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices...


https://auth0.com/learn/refresh-tokens/

A Refresh Token is a special kind of token that can be used to obtain a renewed access token —that allows accessing a protected resource— at any time. You can request new access tokens until the r...


https://auth0.com/docs/protocols/oidc

What is the OpenID Connect protocol and how it works.


https://openid.net/specs/openid-connect-core-1_0.html

Abstract

OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an A...


http://tutorials.jenkov.com/oauth2/index.html

Nice OAuth 2 tutorial with pictures. Makes it easy to understand such a difficult topic.