Authorization across Distributed Systems: The OAuth Protocol

  ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 19,458

Gaurav Sen

Gaurav Sen

ะšาฏะฝ ะฑาฑั€ั‹ะฝ

Websites are like castles, with large moats around them. You need a password at the gate to get in.
And the average person has to remember 27 passwords!
Remembering passwords is a pain. About 30% of all customer queries are "How do I reset my password?"
So websites found a unique solution: outsource the authentication problem to the ๐’ƒ๐™ž๐’ˆ castles.
---------------------------------------------
Instead of asking users to enter an email and password, websites now ask users to "connect" them with Google for registration.
๐ฟ๐‘œ๐‘”๐‘–๐‘› ๐‘†๐‘’๐‘Ÿ๐‘ฃ๐‘–๐‘๐‘’: ๐ป๐‘’๐‘ฆ, ๐‘๐‘œ๐‘ข๐‘™๐‘‘ ๐‘ฆ๐‘œ๐‘ข ๐‘ก๐‘’๐‘™๐‘™ ๐‘š๐‘’ ๐‘กโ„Ž๐‘’ ๐‘›๐‘Ž๐‘š๐‘’ ๐‘œ๐‘“ ๐‘Ž๐‘๐‘@๐‘”๐‘š๐‘Ž๐‘–๐‘™.๐‘๐‘œ๐‘š? ๐‘‡โ„Ž๐‘’๐‘ฆ ๐‘๐‘™๐‘Ž๐‘–๐‘š ๐‘ก๐‘œ ๐‘๐‘’ ๐‘ฆ๐‘œ๐‘ข๐‘Ÿ ๐‘ข๐‘ ๐‘’๐‘Ÿ.
๐บ๐‘œ๐‘œ๐‘”๐‘™๐‘’: ๐‘ƒ๐‘™๐‘’๐‘Ž๐‘ ๐‘’ ๐‘ โ„Ž๐‘œ๐‘ค ๐‘š๐‘’ ๐‘กโ„Ž๐‘’๐‘–๐‘Ÿ ๐‘ ๐‘–๐‘”๐‘›๐‘’๐‘‘ ๐‘Ÿ๐‘’๐‘ž๐‘ข๐‘’๐‘ ๐‘ก.
๐ฟ๐‘œ๐‘”๐‘–๐‘› ๐‘†๐‘’๐‘Ÿ๐‘ฃ๐‘–๐‘๐‘’: ๐‘†๐‘ข๐‘Ÿ๐‘’, โ„Ž๐‘’๐‘Ÿ๐‘’ ๐‘ฆ๐‘œ๐‘ข ๐‘”๐‘œ.
๐บ๐‘œ๐‘œ๐‘”๐‘™๐‘’: ๐‘Œ๐‘’๐‘ , ๐‘กโ„Ž๐‘Ž๐‘ก'๐‘  ๐‘œ๐‘ข๐‘Ÿ ๐‘ข๐‘ ๐‘’๐‘Ÿ. ๐‘‡โ„Ž๐‘’๐‘–๐‘Ÿ ๐‘›๐‘Ž๐‘š๐‘’ ๐‘–๐‘  ๐ฝ๐‘œโ„Ž๐‘› ๐ท๐‘œ๐‘’.
๐ฟ๐‘œ๐‘”๐‘–๐‘› ๐‘†๐‘’๐‘Ÿ๐‘ฃ๐‘–๐‘๐‘’: ๐บ๐‘Ÿ๐‘’๐‘Ž๐‘ก. ๐ผ'๐‘™๐‘™ ๐‘™๐‘’๐‘ก ๐‘กโ„Ž๐‘’๐‘š ๐‘–๐‘›. ๐ถ๐‘œ๐‘ข๐‘™๐‘‘ ๐‘ฆ๐‘œ๐‘ข ๐‘ โ„Ž๐‘Ž๐‘Ÿ๐‘’ ๐‘กโ„Ž๐‘’๐‘–๐‘Ÿ ๐‘๐‘Ÿ๐‘œ๐‘“๐‘–๐‘™๐‘’ ๐‘๐‘–๐‘๐‘ก๐‘ข๐‘Ÿ๐‘’ ๐‘ก๐‘œ๐‘œ?
๐บ๐‘š๐‘Ž๐‘–๐‘™: ๐‘†๐‘œ๐‘Ÿ๐‘Ÿ๐‘ฆ, ๐‘๐‘ข๐‘ก ๐ผ ๐‘๐‘Ž๐‘›'๐‘ก ๐‘ ๐‘’๐‘’ ๐‘กโ„Ž๐‘Ž๐‘ก ๐‘–๐‘› ๐‘กโ„Ž๐‘’ ๐‘ ๐‘–๐‘”๐‘›๐‘’๐‘‘ ๐‘Ÿ๐‘’๐‘ž๐‘ข๐‘’๐‘ ๐‘ก.
๐ฟ๐‘œ๐‘”๐‘–๐‘› ๐‘†๐‘’๐‘Ÿ๐‘ฃ๐‘–๐‘๐‘’: ๐‘๐‘’๐‘ฃ๐‘’๐‘Ÿ ๐‘š๐‘–๐‘›๐‘‘, ๐‘กโ„Ž๐‘Ž๐‘›๐‘˜๐‘ .
The user is now authenticated, and a session token can be sent for further auth requests. This process of outsourcing user authentication (technically authorization, since the user authorized you to view their name) is called OAuth.
---------------------------------------------
Third-party sign-in reduces login hesitance, ease of mobile registration, and password reset issues.
It also consolidates data power into a few companies, which know exactly which websites you visited to tailor your ads (Did you register on FirstCry? Let me show you a diaper ad).
You can learn more about OAuth, SSO, and Access Control Lists at InterviewReady.
Cheers!
00:00 What will we learn?
00:20 The Problem with Passwords
01:25 OAuth Flow
04:22 War story: OAuth Doubles Signups
06:43 Advantages of OAuth
08:55 Drawbacks of OAuth
11:31 Conclusion
12:13 Distributed Security Terms
15:30 Thank you!
System Design at InterviewReady: interviewready.io/
Use the special DISCOUNT coupon of "HELLOWORLD" to avail an exclusive KZbinr channel offer!
#OAuth #Security #DistributedSystems

ะŸั–ะบั–ั€ะปะตั€: 25
@ringringlord
@ringringlord 8 ะฐะน ะฑาฑั€ั‹ะฝ
can we use term oAuth and SSO interchangeably ?
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
No they are different concepts. SSO is managed by a particular company who manage user rights themselves. OAuth is handled by large organisations who ask the user for what permissions they want to extend to the requesting website.
@venkatabhagavatula2620
@venkatabhagavatula2620 8 ะฐะน ะฑาฑั€ั‹ะฝ
@@gkcs they are also different auth mechanisms
@TheKundan11
@TheKundan11 8 ะฐะน ะฑาฑั€ั‹ะฝ
Thanks for making it. Gave good clarity.
@mekanhaji
@mekanhaji 5 ะฐะน ะฑาฑั€ั‹ะฝ
We can go hybrid, I mean at the time of onboarding oAuth is best option, after that we can maintain user details with null password (no password) and give user option to setup a password to after email verification. And done , now you don't have to worry about vendor. Hope this makes sense ๐Ÿ˜….
@deekshajindal4482
@deekshajindal4482 8 ะฐะน ะฑาฑั€ั‹ะฝ
Thumbnail is awesome๐Ÿ‘
@jairajsahgal7101
@jairajsahgal7101 8 ะฐะน ะฑาฑั€ั‹ะฝ
Thank you
@1879heikkisorsa
@1879heikkisorsa 8 ะฐะน ะฑาฑั€ั‹ะฝ
The first part of the title let me belief that you will be talking about auth in distributed systems like where a gateway will authenticate the caller and all microservices won't deal with auth themselves. Another interesting topic for another video?
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
It's covered here: interviewready.io/learn/system-design-course/design-an-emailing-service-like-gmail/chapter_2_authentication__global_caching
@sasmitshubham9424
@sasmitshubham9424 8 ะฐะน ะฑาฑั€ั‹ะฝ
404 error@@gkcs
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
@@sasmitshubham9424 Thanks for reporting Shubham, I am looking into this.
@saurabhchandrapatel
@saurabhchandrapatel 8 ะฐะน ะฑาฑั€ั‹ะฝ
Simple topic like oauth can be explained like this I never think of that ๐Ÿ˜Š๐Ÿ˜Š
@ShashankRustagiCSE
@ShashankRustagiCSE 8 ะฐะน ะฑาฑั€ั‹ะฝ
i need to learn system design, what does your course offer which Alex Xu books dont have?
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
Objectively: InterviewReady has over 220 videos on System Design, Live Classes twice a month and lifetime validity. ByteByteGo doesn't offer any of the above. Subjectively: InterviewReady users have changed their thinking about tech after going through our courses. The in-depth explanations helped secure better salaries, switch companies and add value in team discussions. In short: Over 15000 users have found the courses awesome. We are rated >4.5/5 on average :D Your tech team will be glad that you made this investment.
@ShashankRustagiCSE
@ShashankRustagiCSE 8 ะฐะน ะฑาฑั€ั‹ะฝ
sure will enroll soon@@gkcs
@EnglishRain
@EnglishRain 8 ะฐะน ะฑาฑั€ั‹ะฝ
Problem is the actual implementation by each service. They all do it differently & always a pitn trying to solve the puzzles.
@abhishekgorisaria2897
@abhishekgorisaria2897 8 ะฐะน ะฑาฑั€ั‹ะฝ
How about Okta & Active directory?
@RishiRajxtrim
@RishiRajxtrim 8 ะฐะน ะฑาฑั€ั‹ะฝ
Ruko zaraa, sabr karo. Bola na? Dhakka-mukki nahi karne ka!
@vinit.khandelwal
@vinit.khandelwal 8 ะฐะน ะฑาฑั€ั‹ะฝ
What do you use to track user movement on the website?
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
Microsoft Clarity is a good tool.
@rashmiyadav6810
@rashmiyadav6810 8 ะฐะน ะฑาฑั€ั‹ะฝ
First viewer ๐Ÿ˜
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
Thank you ๐Ÿ™
@manasyendluri9957
@manasyendluri9957 8 ะฐะน ะฑาฑั€ั‹ะฝ
first
@gkcs
@gkcs 8 ะฐะน ะฑาฑั€ั‹ะฝ
Yey!
Design Patterns for High Availability: What gets you 99.999% uptime?
13:08
Gaurav Sen
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 21 ะœ.
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 547 ะœ.
Who Will Eat The Porridge First The Cockroach Or Me? ๐Ÿ‘งvs๐Ÿชณ
00:26
Giggle Jiggle
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 23 ะœะ›ะ
Did you find it?! ๐Ÿค”โœจโœ๏ธ #funnyart
00:11
Artistomg
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 118 ะœะ›ะ
Osman Kalyoncu Sonu รœzรผcรผ Saddest Videos Dream Engine 118 #shorts
00:30
Osman Kalyoncu
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 10 ะœะ›ะ
What is an API Gateway?
15:02
Gaurav Sen
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 46 ะœ.
What is a MICROSERVICE ARCHITECTURE and what are its advantages?
8:19
Gaurav Sen
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 684 ะœ.
What Is JWT and Why Should You Use JWT
14:53
Web Dev Simplified
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 1,1 ะœะ›ะ
Setup Google OAuth sign in 6 minutes
6:51
Appwrite
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 6 ะœ.
What is an API and how do you design it? ๐Ÿ—’๏ธโœ…
15:26
Gaurav Sen
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 706 ะœ.
Difference between cookies, session and tokens
11:53
Valentin Despa
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 566 ะœ.
What is a MESSAGE QUEUE and Where is it used?
9:59
Gaurav Sen
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 938 ะœ.
SAML vs OAuth vs OIDC (explained simply!)
20:32
Ubisecure
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 53 ะœ.
Best Password Managers for 2024: 1Password vs Keeper vs RoboForm vs Lastpass
8:48
Pete Matheson
ะ ะตั‚ า›ะฐั€ะฐะปะดั‹ 9 ะœ.