OAuth 2 scope design for security
VloĆŸit
- Äas pĆidĂĄn 1. 06. 2024
- Check out Neil Madden's book đ API Security in Action | mng.bz/jj7a đ Save 40% with â DISCOUNT CODE: tcapis21 â In this talk, youâll learn best practices for securing access to resources using OAuth 2 scopes and when other technologies may be a better fit. OAuth 2 is very widely used for securing access to APIs. Access to resources is restricted based on the concept of âscopeâ. But what is a scope? How does it differ from permissions or roles? Find the answers here.
đđđ
API Security in Action | mng.bz/jj7a
To save 40% use discount code: tcapis21
đđđ
About the book:
API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide youâll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When youâre done, youâll be able to create APIs that stand up to complex threat models and hostile environments. - VÄda a technologie
Great clear explanation of scopes design decisions , thank you
Thank you, Aissa.