OAuth 2 Scope: Design for Security

OAuth 2 Scope: Design for Security

Channel:
Subscribers:
725,000
Published on ● Video Link: https://www.youtube.com/watch?v=74-MbYY286Y



Duration: 23:38
8,822 views
190


Check out Neil Madden's book ๐Ÿ“– API Security in Action | http://mng.bz/jj7a ๐Ÿ“– Save 40% with โญ DISCOUNT CODE: tcapis21 โญ In this talk, youโ€™ll learn best practices for securing access to resources using OAuth 2 scopes and when other technologies may be a better fit. OAuth 2 is very widely used for securing access to APIs. Access to resources is restricted based on the concept of โ€œscopeโ€. But what is a scope? How does it differ from permissions or roles? Find the answers here.

๐Ÿ“š๐Ÿ“š๐Ÿ“š
API Security in Action | http://mng.bz/jj7a
To save 40% use discount code: tcapis21
๐Ÿ“š๐Ÿ“š๐Ÿ“š

About the book:
API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide youโ€™ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When youโ€™re done, youโ€™ll be able to create APIs that stand up to complex threat models and hostile environments.







Tags:
OAuth2
API
security