24. OAuth 2.0: Explained with API Request and Response Sample | High Level System Design

  Рет қаралды 44,785

Concept && Coding - by Shrayansh

Concept && Coding - by Shrayansh

Күн бұрын

Пікірлер: 66
@deepak-ku9qq
@deepak-ku9qq 11 ай бұрын
you videos made LLD and HLD so simple for me !!
@gowtham4383
@gowtham4383 9 ай бұрын
Great. Thank you for the Clear and Simple Explanation
@abhisheksoni6012
@abhisheksoni6012 2 ай бұрын
That is very well explained, I have been trying to understand Grant Flows for a long time but couldn't find anything concrete, but your video gives me a clear picture about the same. Thank you so much for such detailed explanations.
@neongaming5109
@neongaming5109 Ай бұрын
very well exlained , really good content ..... thanks sir !!!!!
@balakrushnabehera2800
@balakrushnabehera2800 11 ай бұрын
Best explanation ever on OAuth❤❤
@shubhamagarwal1434
@shubhamagarwal1434 7 ай бұрын
Congrats on your 100k Subscribers...
@shubhamrajput37
@shubhamrajput37 11 ай бұрын
Waiting for Spring Boot videos as covered all the topics of Java and LLD, currently going through HLD
@koteshwarraomaripudi1080
@koteshwarraomaripudi1080 11 ай бұрын
For csrf, google could issue token only if the client that is requesting the token is matching with the client id that the code was given to
@modelmaestrosolo
@modelmaestrosolo 24 күн бұрын
exactly what I was thinking. they could even use the client secret too in the matching.
@SandeepAS-ov3fk
@SandeepAS-ov3fk 5 ай бұрын
noone can explain Oauth like you
@shubhamagarwal1434
@shubhamagarwal1434 2 ай бұрын
very well explained.......awsome!!!
@dhivyaviswanathan7604
@dhivyaviswanathan7604 11 ай бұрын
Recently I bought your LLD course from Udemy .The effort is awesome but the thing is some video's are in Hindi its hard to understand since I am from south. Please make upcoming videos in English so that everyone can make use of it.Thanks shreyansh.
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
sure
@adityaallam
@adityaallam 4 ай бұрын
Hi Sir, great video! I have a question, all the sensitive information(client id, client secret, username, password) is sent via query parameters, how is security ensured so that these information is not stolen? Thanks in advance!
@gauravraj2604
@gauravraj2604 10 ай бұрын
Hey Shreyansh, Do you have any plan to create a video on fetching thread dump and analysing it for debugging purposes ? Please reply if you see this. I have asked multiple things on different videos but unfortunately could not get reply to any.
@prateek2159
@prateek2159 6 ай бұрын
Hi Shrayansh, I think there is some mistake in the CSRF attack workflow here. When Insta sends request to the resource server with authorization_code (of the attacker), redirect_uri, id and secret the resource server after validation of the code sends the response with the requested data to the redirect_url (which is insta’s uri because this is what was present in the request) not the attacker. Just with the authorization code of the attacker, there is no way for the resource server to send the data to the attacker.
@shubhamjumde9076
@shubhamjumde9076 7 ай бұрын
When there is inter service communication, like Order service calls Delivery service, how OAuth is implemented? What would be resource owner, authentication server and all? This video very well explains OAuth and helped me to understand OAuth . Thank you!
@rameshsapphire7945
@rameshsapphire7945 Ай бұрын
@shrayansh, in Authorization code grant, fetch token call is authorised by authorization code we provide as parameter, and in ROPC, i saw the POST/token request is authorised by user name and password, and in implicit Grant, the get/authorise is authorised by state variable and like that in Client Credentials grant, i see no parameter is passed in GET/token call, so my question is how this request call gets authorised? is it only using client id and secret? is it safe compared to other mechanisms?
@vijayakumarvj
@vijayakumarvj Ай бұрын
Amazing Video..Can you explain about openId connect and how it is related to oauth?
@khushgandhi6638
@khushgandhi6638 11 ай бұрын
Hey shreyansh , how many videos are pending for the hld playlist?
@sitikantapanigrahi8621
@sitikantapanigrahi8621 10 ай бұрын
Hello bhaiya. I have one query. Should i have to pay monthly if i join the membership.
@kartikeyrana3736
@kartikeyrana3736 11 ай бұрын
eagerly waiting for the Springboot implementation !
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
yea
@DurgaShiva7574
@DurgaShiva7574 11 ай бұрын
Eagerly Waiting for JWT video, as well as Spring boot implementation for O-AUTH as well as JWT from you.
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
ack
@ShashikantPawar-g5u
@ShashikantPawar-g5u 10 ай бұрын
Can you cover use cases of each grant type
@gauravraj2604
@gauravraj2604 11 ай бұрын
Hey Shrayansh, posting 1 question related to LLD / HLD interview. 1. How are we supposed to create those block diagrams and demonstrate during interview? Asking as I can see interviewee is using some software in one of the mock interviews you took which might not be possible for others. 2. Also does it depend oncompany to company whether they will select an interviewee when he was unable to submit working code though was able to convey uml diagram?
@pavankumarreddy8642
@pavankumarreddy8642 11 ай бұрын
I too have the same doubt.
@vikasrai4915
@vikasrai4915 11 ай бұрын
Hello Shreyansh, I have been following since more than a year now, I have been binge watching your videos earlier even when I wasn't interviewing, a few months back I had some health issue and I had to take break from my work, now I am preparing for interviews and I am trying to watch your playlist, few videos are member only, and you also have a course on udemy, so my question is, Is your course on udemy and the playlist on youtube(with membership) any different or they both are same ? If not same what are the differences? Regards.
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
its same just for engineers who prefer udemy over youtube.
@ramprasadthakur1682
@ramprasadthakur1682 7 ай бұрын
Hi Shreyansh In CSRF attack attacker can know my state value as it's passed in request param if he intercepts my request he will get access to it as well right?
@harshitgoel6612
@harshitgoel6612 11 ай бұрын
when can we expect spring boot series ?
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
by this month i will share the roadmap, thats my plan
@ShubhamRajput23
@ShubhamRajput23 11 ай бұрын
Hello Shreyansh, Regarding the authorization & token request, video mentions to include the redirect URI in the query parameter. Typically, for each REST API POST call, we expect a response. Could you clarify whether the authorization code will be included in the REST API call response, or if it will be sent separately by the authorization server via a webhook call to the client's redirect URI? If it is indeed a webhook call, does the client also need to expose an endpoint to receive the authorization code? I'm curious about the industry standard in this context.
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
The authorization code is included in the redirect URI as a query parameter in the response to the authorization request. The client needs to expose an endpoint (the redirect URI) to receive and handle the authorization code. There is no industry standard for delivering the authorization code via webhook; it's typically delivered directly to the client's specified redirect URI I would say, this is generally for security purpose.
@nazimuddinasif5489
@nazimuddinasif5489 11 ай бұрын
It is possible to get this note?
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
will add it by EOD
@nazimuddinasif5489
@nazimuddinasif5489 11 ай бұрын
@@ConceptandCoding ok thanks
@user-zp1dv4yh5e
@user-zp1dv4yh5e 11 ай бұрын
Can you also make it for Azure AD Oauth?
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
noted
@kazcode1937
@kazcode1937 11 ай бұрын
@@ConceptandCoding what is difference btw authorization and authentication?
@AbhishekKumar-kk6qs
@AbhishekKumar-kk6qs 11 ай бұрын
Hi shreyansh, Can you please suggest some books which u follow for learning these cool backend technology.
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
generally i go with official documentation buddy
@tejasshaha6629
@tejasshaha6629 11 ай бұрын
Nice video. 1 question. For /authorization api why we are using GET request ? What if Gmail want to create/update entry at their side to make sure who has asked for code/token then it should be POST request right ?
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
nice catch Tejas. i think this design choice might be done because of simplicity or ease of integration. But you know, this do post the security issues (usage of GET call) . So thats why Authorization code grant type with PKCE is nowadays recommended which try to mitigate this exposure of authorization code in previous GET call. i think i should cover that too.
@tejasshaha6629
@tejasshaha6629 11 ай бұрын
@@ConceptandCoding Sure sir. Thank you for the explanation.
@whoshyam
@whoshyam 3 ай бұрын
notes link please ?
@meghadave9363
@meghadave9363 9 ай бұрын
Hi is it possible for you to add gpay payment option for your course. please
@ConceptandCoding
@ConceptandCoding 9 ай бұрын
i think in mobile app you will get that
@meghadave9363
@meghadave9363 9 ай бұрын
@@ConceptandCoding payment is falling for all options
@meghadave9363
@meghadave9363 9 ай бұрын
@@ConceptandCoding tried Gpay on app, credit card also, it's failing
@nikhilpandey856
@nikhilpandey856 2 ай бұрын
great
@Loki-vy5vg
@Loki-vy5vg 8 ай бұрын
I doubt what you taught, can you please share resources I can refer to and verify 🙏
@ConceptandCoding
@ConceptandCoding 8 ай бұрын
pls check original documentation of OAuth2.0 RFC
@saideepak1740
@saideepak1740 11 ай бұрын
@Shreyansh please share notes🙏
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
sorry i was out this weekend, will do it tomm for sure
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
notebook.zohopublic.in/public/notes/bietv949cfd82a5804e0ea1d18400d3ff6fa3
@saideepak1740
@saideepak1740 11 ай бұрын
Thankyou shreyansh
@anshumansingh6336
@anshumansingh6336 11 ай бұрын
where are the notes...references..
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
oops my bad, will add the notes link in description section by EOD
@Dlk9407
@Dlk9407 11 ай бұрын
@@ConceptandCodingpls add bro
@harshitagarwal2682
@harshitagarwal2682 5 ай бұрын
👍👍
@varunaggarwal7126
@varunaggarwal7126 6 ай бұрын
I am working in a fortune 20 company and everywhere they have implemented implicit grant 😂
@JuliaAnne
@JuliaAnne 3 ай бұрын
Thompson Sarah Young David Miller Angela
@ratansarkar7444
@ratansarkar7444 11 ай бұрын
AK din ke liye videos free kar do na vaiya
@ConceptandCoding
@ConceptandCoding 11 ай бұрын
done buddy
API GATEWAY and Microservices Architecture | How API Gateway act as a Single Entry Point?
23:18
Concept && Coding - by Shrayansh
Рет қаралды 46 М.
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН
OAuth 2.0 explained with examples
10:03
ByteMonk
Рет қаралды 170 М.
System Design: Concurrency Control in Distributed System | Optimistic & Pessimistic Concurrency Lock
1:04:45
Serialization and Deserialization for backend engineers
21:48
Sriniously
Рет қаралды 1,4 М.
Learn OAuth2 with Project in one shot | AOuth2 Tutorial in Hindi | OAUTH2 CrashCourse
2:05:17
Session Vs JWT: The Differences You May Not Know!
7:00
ByteByteGo
Рет қаралды 300 М.
Service Mesh and its Architecture | How Microservices Communicate?
23:54
Concept && Coding - by Shrayansh
Рет қаралды 16 М.
OAuth 2 Explained In Simple Terms
4:32
ByteByteGo
Рет қаралды 485 М.
How DNS works? | System Design of Domain Name System
33:01
Concept && Coding - by Shrayansh
Рет қаралды 11 М.
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН