How does machine to machine authorization work? And, how to use it (M2M)

  Рет қаралды 5,740

OktaDev

OktaDev

Күн бұрын

Пікірлер: 8
@nicholas1460
@nicholas1460 9 ай бұрын
Good stuff, helpful terminology and use case review.
@zacktzeng8569
@zacktzeng8569 4 ай бұрын
Hi you mentioned that client credential grant should only be used for trusted services and not internet facing services. If i have a public web app with frontend and backend and i want to only allow this public web backend to access my custom backend resources, should i pick a different method? If so, what wouls you recommend? Thanks!!
@cliffmathew
@cliffmathew 3 ай бұрын
You completely skipped how the resource server validates an access token presented by the client, before allowing access.
@christopherkirkos1790
@christopherkirkos1790 5 ай бұрын
I want to run automated tests in my staging environment, but I have to simulate a user to do so (need email address associated with token). How should I achieve this?
@mohanchennagiri8039
@mohanchennagiri8039 9 ай бұрын
@2:30, how does the resource-server ensure the access-token is authentic? Is there implicit trust, or does it call authorization server to validate the token?
@WillJohnsonio
@WillJohnsonio 8 ай бұрын
Great question, the resource server verifies the token signature
@MichaelStein-ty5du
@MichaelStein-ty5du 4 ай бұрын
@@WillJohnsonio No it does not. The application will need to verify the JWT: From AuthO: Auth0 uses JSON Web Token (JWT) for secure data transmission, authentication, and authorization. Tokens should be parsed and validated in regular web, native, and single-page applications to make sure the token isn’t compromised and the signature is authentic. Tokens should be verified to decrease security risks if the token has been, for example, tampered with, misused, or has expired. JWT validation checks the structure, claims, and signature to assure the least amount of risk.
@ahsath
@ahsath 6 ай бұрын
isn't IoT devices not a trusted client if they operate autonomously like a vending machine in a parking lot that make requests to a DB aka resource? I say this because they are susceptible to be stolen and reversed engineered to get the "secrets"
How to Hack OAuth
25:10
OktaDev
Рет қаралды 43 М.
黑的奸计得逞 #古风
00:24
Black and white double fury
Рет қаралды 17 МЛН
小天使和小丑太会演了!#小丑#天使#家庭#搞笑
00:25
家庭搞笑日记
Рет қаралды 59 МЛН
Login and issue API access tokens with Auth0 and FastAPI
18:06
microapis
Рет қаралды 1,8 М.
Everything You Ever Wanted to Know About OAuth and OIDC
33:21
Ten Types of Authorization
51:02
Oso
Рет қаралды 247
What are Refresh Tokens?! and...How to Use Them Securely
19:29
OAuth 2.0 explained with examples
10:03
ByteMonk
Рет қаралды 146 М.
Adding Salt to Hashing: A Better Way to Store Passwords
18:18
Cybersecurity Architecture: Roles and Tools
14:07
IBM Technology
Рет қаралды 112 М.
黑的奸计得逞 #古风
00:24
Black and white double fury
Рет қаралды 17 МЛН