Useful Links
1. Introduction to Secure Delegated Access
2. OAuth 2.0 Framework Fundamentals
3. OAuth 2.0 Protocol Endpoints
4. OAuth 2.0 Tokens
5. Scopes and Permissions
6. OAuth 2.0 Authorization Grants
7. OpenID Connect Identity Layer
8. JSON Web Tokens in OAuth and OIDC
9. Security Considerations and Threats
10. Advanced OAuth and OIDC Topics
11. OAuth 2.1 Evolution
12. Implementation Guidance
  1. Computer Science
  2. Other Tools and Technologies

OAuth and OIDC

1. Introduction to Secure Delegated Access
2. OAuth 2.0 Framework Fundamentals
3. OAuth 2.0 Protocol Endpoints
4. OAuth 2.0 Tokens
5. Scopes and Permissions
6. OAuth 2.0 Authorization Grants
7. OpenID Connect Identity Layer
8. JSON Web Tokens in OAuth and OIDC
9. Security Considerations and Threats
10. Advanced OAuth and OIDC Topics
11. OAuth 2.1 Evolution
12. Implementation Guidance
  1. OAuth 2.0 Tokens
    1. Access Tokens
      1. Purpose and Function
        1. Resource Access Authorization
          1. Bearer Token Usage
          2. Token Formats
            1. Opaque Tokens
              1. Characteristics
                1. Validation Requirements
                  1. Storage Considerations
                  2. Structured Tokens
                    1. JSON Web Tokens
                      1. Self-Contained Information
                        1. Validation Process
                      2. Token Properties
                        1. Scope and Permissions
                          1. Audience Restrictions
                            1. Expiration Time
                              1. Issuer Information
                              2. Token Lifecycle
                                1. Issuance
                                  1. Usage
                                    1. Expiration
                                      1. Revocation
                                    2. Refresh Tokens
                                      1. Purpose and Function
                                        1. Long-Term Access
                                          1. Token Renewal
                                          2. Security Characteristics
                                            1. Long-Lived Nature
                                              1. Single Use Principle
                                                1. Rotation Strategies
                                                2. Refresh Token Rotation
                                                  1. Security Benefits
                                                    1. Implementation Approaches
                                                      1. Revocation Handling
                                                    2. Token Security
                                                      1. Storage Requirements
                                                        1. Transmission Security
                                                          1. Leakage Prevention
                                                            1. Revocation Mechanisms

                                                          Previous

                                                          3. OAuth 2.0 Protocol Endpoints

                                                          Go to top

                                                          Next

                                                          5. Scopes and Permissions

                                                          © 2025 Useful Links. All rights reserved.

                                                          About•Bluesky•X.com