Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This is the wiki home of a self-organized study group on OAuth2 and OpenID Connect (OIDC) 


Info
titleOur next meeting will occur on Thursday, June 1 at 2 October 5, 2:00 pm Eastern, 11 am Pacific

Subscribe to mailing list, tier-oauth@internet2.edu

Agenda and Notes Online

To join via computer audio/video - https://bluejeans.com/678543210/browser

To join via Phone:

1) Dial:

2) Enter Conference ID: 678543210#

 

...

OAUTH2 IN ACTION, Justin Richer, Antonio Sanso

Part 1 First steps .................................................................1

 1 ■ What is OAuth 2.0 and why should you care? 3

 2 ■ The OAuth dance 21

Part 2  Building an OAuth 2 environment ......................41

 3 ■ Building a simple OAuth client 43 (April 20)

 4 ■ Building a simple OAuth protected resource 59 (May 4)

 5 ■ Building a simple OAuth authorization server 75 (May 18)

 6 ■ OAuth 2.0 in the real world 93 (June 1)

Part 3  OAuth 2 implementation and vulnerabilities ............................119

 7 ■ Common client vulnerabilities 121

 8 ■ Common protected resources vulnerabilities 138

 9 ■ Common authorization server vulnerabilities 154

 10 ■ Common OAuth token vulnerabilities 168

Part 4  Taking OAuth further ..........................................179

 11 ■ OAuth tokens 181

 12 ■ Dynamic client registration 208

 13 ■ User authentication with OAuth 2.0 236

 14 ■ Protocols and profiles using OAuth 2.0 262

 15 ■ Beyond bearer tokens 282

...

  • OAuth 2

 

...

...