ORPP logo

Mastering OAuth 2. 0 : (Record no. 103416)

MARC details
000 -LEADER
fixed length control field 09803nam a22004693i 4500
001 - CONTROL NUMBER
control field EBC4191352
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729130144.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2015 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781784392307
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781784395407
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC4191352
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL4191352
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr11206657
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL880925
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)951064926
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.A63.B545 2015eb
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 5.133
245 10 - TITLE STATEMENT
Title Mastering OAuth 2. 0 :
Remainder of title Create Powerful Applications to Interact with Popular Service Providers Such As Facebook, Google, Twitter, and More by Leveraging the OAuth 2. 0 Authorization Framework.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham :
Name of producer, publisher, distributor, manufacturer Packt Publishing, Limited,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (238 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Why Should I Care About OAuth 2.0? -- Authentication versus authorization -- Authentication -- Authorization -- What problems does it solve? -- Federated identity -- Delegated authority -- Real-life examples of OAuth 2.0 in action -- How does OAuth 2.0 actually solve the problem? -- Without OAuth 2.0 - GoodApp wants to suggest contacts by looking at your Facebook friends -- With OAuth 2.0 - GoodApp wants to suggest contacts by looking at your Facebook friends -- Who uses OAuth 2.0? -- Introducing "The World's Most Interesting Infographic Generator -- Summary -- Chapter 2: A Bird's Eye View of OAuth 2.0 -- How does it work? -- User consent -- Two main flows for two main types of client -- Trusted versus untrusted clients -- First look at the client-side flow -- An untrusted client - GoodApp requests access for user's Facebook friends using implicit grant -- The big picture -- When should this be used? -- Pros and cons of being an untrusted client -- Pros -- Cons -- First look at the server-side flow -- A trusted client - GoodApp requests access for user's Facebook friends using authorization code grant -- The big picture -- When should this be used? -- Pros and cons of being a trusted client -- Pros -- Cons -- What are the differences? -- What about mobile? -- Summary -- Chapter 3: Four Easy Steps -- Let's get started -- Step 1 - Register your client application -- Different service providers, different registration process, same OAuth 2.0 protocol -- Your client credentials -- Step 2 - Get your access token -- A closer look at access tokens -- Scope -- Duration of access -- Token revocation -- Sometimes a refresh token -- Step 3 - Use your access token -- An access token is an access token.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Step 4 - Refresh your access token -- What if I don't have a refresh token? -- Refresh tokens expire too -- Putting it all together -- Summary -- Chapter 4: Register Your Application -- Recap of registration process -- Registering your application with Facebook -- Creating your application -- Setting your redirection endpoint -- What is a redirection endpoint? -- Find your service provider's authorization and token endpoints -- Putting it all together! -- Summary -- Chapter 5: Get an Access Token with the Client-Side Flow -- Refresher on the implicit grant flow -- A closer look at the implicit grant flow -- Authorization request -- According to the specification -- In our application -- Access token response -- Success -- Error -- Let's build it! -- Build the base application -- Install Apache Maven -- Create the project -- Configure base project to fit our application -- Modify the hosts file -- Running it for the first time -- Make the authorization request -- Handle the access token response -- Summary -- Reference pages -- Authorization request -- Access token response -- Error response -- Chhapter 6: Get an Access Token with the Server-Side Flow -- Refresher on the authorization code grant flow -- A closer look at the authorization code grant flow -- Authorization request -- According to the specification -- In our application -- Authorization response -- Success -- Error -- Access token request -- According to the specification -- In our application -- Access token response -- Success -- Error -- Let's build it! -- Build the base application -- Install Apache Maven -- Create the project -- Configure the base project to fit our application -- Modify the hosts file -- Running it for the first time -- Make the authorization request -- Handle the authorization response -- Make the access token request -- Handle the access token response.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Summary -- Reference pages -- An overview of the authorization code grant flow -- Authorization request -- Authorization response -- Error response -- Access token request -- Access token response -- Error response -- Chapter 7: Use Your Access Token -- Refresher on access tokens -- Use your access token to make an API call -- The authorization request header field -- The form-encoded body parameter -- The URI query parameter -- Let's build it! -- In our client-side application -- Send via the URI query parameter -- Send via the form-encoded body parameter -- In our server-side application -- Send via the URI query parameter -- Send via the HTTP authorization header -- Creating the world's most interesting infographic -- Summary -- Reference pages -- An overview of protected resource access -- The authorization request header field -- The form-encoded body parameter -- The URI query parameter -- Chapter 8: Refresh Your Access Token -- A closer look at the refresh token flow -- The refresh request -- According to the specification -- The access token response -- Success -- Error -- What if I have no refresh token? Or my refresh token has expired? -- Comparison between the two methods -- The ideal workflow -- Summary -- Reference pages -- An overview of the refresh token flow -- The refresh request -- Access token response -- Error response -- Chapter 9: Security Considerations -- What's at stake? -- Security best practices -- Use TLS! -- Request minimal scopes -- When using the implicit grant flow, request read-only permissions -- Keep credentials and tokens out of reach of users -- Use the authorization code grant flow whenever possible -- Use the refresh token whenever possible -- Use native browsers instead of embedded browsers -- Do not use third-party scripts in the redirection endpoint -- Rotate your client credentials -- Common attacks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Cross-site request forgery (CSRF) -- What's going on? -- Use the state param to combat CSRF -- Phishing -- Redirection URI manipulation -- Client and user impersonation -- Summary -- Chapter 10 : What About Mobile? -- What is a mobile application? -- What flow should we use for mobile applications? -- Are mobile applications trusted or untrusted? -- What about mobile applications built on top of mobile platforms with secure storage APIs? -- Not quite enough -- Hybrid architectures -- Implicit for mobile app, authorization code grant for backend server -- What is the benefit of this? -- Authorization via application instead of user-agent -- Summary -- Chapter 11: Tooling and Troubleshooting -- Tools -- Troubleshooting -- The implicit grant flow -- The authorization request -- The authorization code grant flow -- The authorization request -- The access token request -- The API call flow -- The authorization request header field -- The form-encoded body parameter -- The URI query parameter -- The refresh token flow -- Summary -- Chapter 12: Extensions to OAuth 2.0 -- Extensions to the OAuth 2.0 framework -- Custom grant types -- A variety of token types -- Any authorization backend -- OpenID Connect -- Summary -- Appendix A: Resource Owner Password Credentials Grant -- When should you use it? -- Reference pages -- An overview of the resource owner password credentials grant -- Authorization request and response -- Access token request -- Access token response -- Error response -- Appendix B: Client Credentials Grant -- When should you use it? -- Reference pages -- Overview of the client credentials grant -- Authorization request and response -- Access token request -- Access token response -- Error response -- Appendix C: Reference Specifications -- The OAuth 2 Authorization Framework -- The OAuth 2 Authorization Framework: Bearer Token Usage.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note OAuth 2.0 Token Revocation -- OAuth 2.0 Thread Model and Security Considerations -- Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants -- Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants -- JSON Web Token (JWT) -- JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants -- OpenID Connect Core 1.0 -- HTTP Authentication: Basic and DigestAccess Authentication -- Index.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application program interfaces (Computer software).
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading
Title Mastering OAuth 2. 0
Place, publisher, and date of publication Birmingham : Packt Publishing, Limited,c2015
International Standard Book Number 9781784395407
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4191352">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4191352</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.