Everything You Ever Wanted to Know About OAuth and OIDC

  Рет қаралды 33,526

OktaDev

OktaDev

Күн бұрын

In this session, Aaron Parecki, author of OAuth 2.0 Simplified and co-editor of the in-progress OAuth 2.1 spec, will cover the basics of the OAuth and OpenID Connect protocols. You’ll learn about when you’d want to use OAuth or OpenID Connect (or both!), when to use each of the grant types, and how to use OAuth and OpenID Connect securely from mobile applications. Aaron also covers the latest best practices around OAuth security currently in development by the group. You'll also learn about the upcoming OAuth 2.1 update and what it means for you and your applications. You'll learn how to use JWT access tokens and the tradeoffs that come with them, how to design scopes that allow granular access to various parts of your backend services, and how to design a microservices architecture protected by OAuth at a gateway.
Speakers:
Aaron Parecki, Okta
__
Don't forget to subscribe to our channel and hit the notification bell so you never miss an upload: bit.ly/OktaKZbin​
__
Want more Okta? Check out our social media for updates:
bit.ly/OktaLinkedIn​
bit.ly/OktaTwitter​
bit.ly/OktaFacebook

Пікірлер: 29
@soumyagupta4910
@soumyagupta4910 9 күн бұрын
didn't think I'd enjoy learning about OAuth so much. Thanks a ton!
@yapayzeka
@yapayzeka 11 ай бұрын
I watched a lot of videos about the context and this is the most clear and satifying explanation of them all. thank you very very much.
@xdaniel3936
@xdaniel3936 8 ай бұрын
This is by far the best explanation. Thank you so much!
@emiliocolombo142
@emiliocolombo142 2 ай бұрын
Great high level overview of these protocols. Thank you a lot
@marcom.
@marcom. Жыл бұрын
Thanks a lot, Aaron. This is by far the best and comprehensive video I saw about these topics.
@jagan4269
@jagan4269 2 жыл бұрын
Wow!!! This is SPOT ON. Thanks for the excellent presentation Aaron.
@interdechile
@interdechile Жыл бұрын
Thanks Aaron! This is the clearest explanation about oauth that I have seen
@chrislegaxy6355
@chrislegaxy6355 2 жыл бұрын
By far the best explanation! 🙌 Thank you! You rock!
@ledgentai1227
@ledgentai1227 2 жыл бұрын
Fantastic video, thank you. In fact the only explanation of these concepts I could find that made sense.
@floid33556
@floid33556 9 ай бұрын
Really great explanation. Thank you!
@4ortson
@4ortson 2 ай бұрын
this should be watched by more devs
@debkr
@debkr Жыл бұрын
Nice 👍 Please post some videos on OIDC Single Sign on.
@gitahinganga3136
@gitahinganga3136 Жыл бұрын
Very clear and concise Thanks a bunch!
@leminhdung1981
@leminhdung1981 Жыл бұрын
Excellent! Thank you very much!
@cli2701
@cli2701 2 жыл бұрын
Excellently explained! Thanks!
@li.tan.activities
@li.tan.activities 2 жыл бұрын
Fantastic explanation! Thank you!
@kevincornally8392
@kevincornally8392 3 жыл бұрын
Such a great presentation !!!!
@drakezen
@drakezen 3 жыл бұрын
Amazing explanation.
@ftlight2362
@ftlight2362 3 жыл бұрын
that is soooo useful! ) great explanation, thanks!
@masteredd
@masteredd 2 жыл бұрын
Great explanation! Thanks
@jamesallen74
@jamesallen74 3 жыл бұрын
Fantastic video!
@nestorguemez4846
@nestorguemez4846 Жыл бұрын
Excellent content!
@shaunpx1
@shaunpx1 2 жыл бұрын
Great video, thank you for clearly explaining this topic!!! Also Where did you get that shirt it is awesome!
@clz230
@clz230 3 жыл бұрын
It was nicely done, Aaron! Excellent presentation and effortless communication!
@gobindrawat3496
@gobindrawat3496 3 жыл бұрын
One more question : As mentioned in the use case , if the Access Token has 8 hours validity and during the registration/login , user gave consent for some explicit scopes ( example vehicle data) , the access token has the claims information and if clients are checking the claims information and validity against IDP token introspection endpoint and based on the response are letting the user uses their api. What if in the meantime , user revoke some of the consent ? Access Token will still consist the previously given consent information and if the client is based on IDP token introspection response then critical service access will become accessible. Revoking the token and asking the user to log in again so correct consent based token can be generated can lead to very bad user experience if IDP has global logout & SSO . Any best practices here ? Please share some . Thanx
@gobindrawat3496
@gobindrawat3496 3 жыл бұрын
Hi , I have a question regarding Refresh Token Use case especially when we have a unreliable clients ( Native Apps) . The new best practice about Refresh Token mentions that it should be replaced with each new token exchange request . So basically with new token exchange request , client receives a new refresh Token along with Access & ID Token . How should we tackle a Logout scenario if client is mobile app . Mobile App can have very unreliable network and due to this User can be logout due to expired Token . Is there any best practices regarding this use case ? Thanks I’m advance . Ok
@meepk633
@meepk633 10 ай бұрын
So I should be using PKCE for my confidential OIDC client that's already checking state and nonce? I'd rather not rewrite it if those older DPOPs are sufficient.
@aaronpk
@aaronpk 10 ай бұрын
If you are checking the nonce, as well as checking the ath claim in the ID token to compare it to the access token, then you are protected from access token injection. However there is no protection from ID token leakage in the front channel if you are using the OIDC implicit flow. The other way to look at it is you can remove a bunch of code and replace it with a smaller amount of code that does PKCE, and removing code means less opportunity for bugs and errors.
@cd-stephen
@cd-stephen 10 ай бұрын
ftw
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,7 МЛН
How to Hack OAuth
25:10
OktaDev
Рет қаралды 42 М.
Ouch.. 🤕
00:30
Celine & Michiel
Рет қаралды 21 МЛН
A Developer's Guide to SAML
27:47
OktaDev
Рет қаралды 177 М.
Explain it to Me Like I’m 5: Oauth2 and OpenID
47:50
SpringDeveloper
Рет қаралды 70 М.
OAuth: When Things Go Wrong
43:58
OktaDev
Рет қаралды 26 М.
Protecting Your APIs with OAuth
59:25
OktaDev
Рет қаралды 12 М.
OAuth 2.0 & OpenID Connect (OIDC): Technical Overview
16:19
VMware End-User Computing
Рет қаралды 154 М.
Why is JWT popular?
5:14
ByteByteGo
Рет қаралды 299 М.
oAuth and OpenID connect | Most confusing topic in plain english
31:11
📱магазин техники в 2014 vs 2024
0:41
djetics
Рет қаралды 479 М.
Xiaomi SU-7 Max 2024 - Самый быстрый мобильник
32:11
Клубный сервис
Рет қаралды 539 М.
Nokia 3310 top
0:20
YT 𝒯𝒾𝓂𝓉𝒾𝓀
Рет қаралды 3,5 МЛН
КРУТОЙ ТЕЛЕФОН
0:16
KINO KAIF
Рет қаралды 6 МЛН
Samsung laughing on iPhone #techbyakram
0:12
Tech by Akram
Рет қаралды 6 МЛН
Kumanda İle Bilgisayarı Yönetmek #shorts
0:29
Osman Kabadayı
Рет қаралды 2,4 МЛН