Useful Links
Computer Science
Other Tools and Technologies
OAuth and OIDC
1. Introduction to Secure Delegated Access
2. OAuth 2.0 Framework Fundamentals
3. OAuth 2.0 Protocol Endpoints
4. OAuth 2.0 Tokens
5. Scopes and Permissions
6. OAuth 2.0 Authorization Grants
7. OpenID Connect Identity Layer
8. JSON Web Tokens in OAuth and OIDC
9. Security Considerations and Threats
10. Advanced OAuth and OIDC Topics
11. OAuth 2.1 Evolution
12. Implementation Guidance
Implementation Guidance
Choosing Appropriate Flows
Single-Page Applications
Authorization Code with PKCE
Security Considerations
Token Storage Strategies
Traditional Web Applications
Authorization Code Flow
Server-Side Token Management
Session Integration
Mobile Applications
Native App Best Practices
Deep Linking Considerations
Platform-Specific Security
APIs and Microservices
Client Credentials Flow
Service-to-Service Authentication
Token Validation Strategies
Machine-to-Machine Communication
Automated Processes
Certificate-Based Authentication
Scope Management
Client Implementation Patterns
Library Selection
Configuration Management
Error Handling
Testing Strategies
Server Implementation Patterns
Authorization Server Setup
Resource Server Configuration
Database Design
Scalability Considerations
Integration Patterns
API Gateway Integration
Microservices Architecture
Legacy System Integration
Third-Party Service Integration
Previous
11. OAuth 2.1 Evolution
Go to top
Back to Start
1. Introduction to Secure Delegated Access