万本电子书0元读

万本电子书0元读

顶部广告

OAuth 2.0 Cookbook电子书

售       价:¥

19人正在读 | 0人评论 6.2

作       者:Adolfo Eloy Nascimento

出  版  社:Packt Publishing

出版时间:2017-10-18

字       数:55.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies. About This Book ? Interact with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. ? Use Spring Security and Spring Security OAuth2 to implement your own OAuth 2.0 provider ? Learn how to implement OAuth 2.0 native mobile clients for Android applications Who This Book Is For This book targets software engineers and security experts who are looking to develop their skills in API security and OAuth 2.0. Prior programming knowledge and a basic understanding of developing web applications are necessary. As this book's recipes mostly use Spring Security and Spring Security OAuth2, some prior experience with Spring Framework will be helpful. What You Will Learn ? Use Redis and relational databases to store issued access tokens and refresh tokens ? Access resources protected by the OAuth2 Provider using Spring Security ? Implement a web application that dynamically registers itself to the Authorization Server ? Improve the safety of your mobile client using dynamic client registration ? Protect your Android client with Proof Key for Code Exchange ? Protect the Authorization Server from invalid redirection In Detail OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications. The book starts by presenting you how to interact with some public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google. You will also be able to implement your own OAuth 2.0 provider with Spring Security OAuth2. Next, the book will cover practical scenarios regarding some important OAuth 2.0 profiles such as Dynamic Client Registration, Token Introspection and how to revoke issued access tokens. You will then be introduced to the usage of JWT, OpenID Connect, and how to safely implement native mobile OAuth 2.0 Clients. By the end of this book, you will be able to ensure that both the server and client are protected against common vulnerabilities. Style and approach With the help of real-world examples, this book provides step by step recipes for troubleshooting and extending your API security. The book also helps you with accessing and securing data on mobile, desktop, and cloud apps with OAuth 2.0.
目录展开

Title Page

Copyright

OAuth 2.0 Cookbook

Credits

About the Author

About the Reviewer

www.PacktPub.com

Why subscribe?

Customer Feedback

Preface

What this book covers

What you need for this book

Who this book is for

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Conventions

Reader feedback

Customer support

Downloading the example code

Downloading the color images of this book

Errata

Piracy

Questions

OAuth 2.0 Foundations

Introduction

Preparing the environment

Getting ready

How to do it...

See also

How it works...

There's more...

See also

Reading the user's contacts from Facebook on the client side

Getting ready

How to do it...

How it works...

There's more...

See also

Reading the user's contacts from Facebook on the server side

Getting ready

How to do it...

How it works...

There's more...

See also

Accessing OAuth 2.0 LinkedIn protected resources

Getting ready

How to do it...

How it works...

There's more...

See also

Accessing OAuth 2.0 Google protected resources bound to the user's session

Getting ready

How to do it...

How it works...

There's more...

See also

Implementing Your Own OAuth 2.0 Provider

Introduction

Protecting resources using the Authorization Code grant type

Getting ready

How to do it...

How it works...

There's more...

Supporting the Implicit grant type

Getting ready

How to do it...

How it works...

There's more...

See also

Using the Resource Owner Password Credentials grant type as an approach for OAuth 2.0 migration

Getting ready

How to do it...

How it works...

There's more...

See also

Configuring the Client Credentials grant type

Getting ready

How to do it...

How it works...

There's more...

See also

Adding support for refresh tokens

Getting ready

How to do it...

How it works...

There's more...

See also

Using a relational database to store tokens and client details

Getting ready

How to do it...

How it works...

There's more...

See also

Using Redis as a token store

Getting ready

How to do it...

How it works...

See also

Implementing client registration

Getting ready

How to do it...

How it works...

See also

Breaking the OAuth 2.0 Provider in the middle

Getting ready

How to do it...

How it works...

See also

Using Gatling to load test the token validation process using shared databases

Getting ready

How to do it...

How it works...

See also

Using OAuth 2.0 Protected APIs

Introduction

Creating an OAuth 2.0 client using the Authorization Code grant type

Getting ready

How to do it...

How it works...

Creating an OAuth 2.0 client using the Implicit grant type

Getting ready

How to do it...

How it works...

There's more...

See also

Creating an OAuth 2.0 client using the Resource Owner Password Credentials grant type

Getting ready

How to do it...

How it works...

There's more...

See also

Creating an OAuth 2.0 client using the Client Credentials grant type

Getting ready

How to do it...

How it works...

See also

Managing refresh tokens on the client side

Getting ready

How to do it...

How it works...

See also

Accessing an OAuth 2.0 protected API with RestTemplate

Getting ready

How to do it...

How it works...

See also

OAuth 2.0 Profiles

Introduction

Revoking issued tokens

Getting ready

How to do it...

How it works...

Remote validation using token introspection

Getting ready

How to do it...

How it works...

There's more...

Improving performance using cache for remote validation

Getting ready

How to do it...

How it works...

See also

Using Gatling to load test remote token validation

Getting ready

How to do it...

There's more...

See also

Dynamic client registration

Getting ready

How to do it...

How it works...

There's more...

See also

Self Contained Tokens with JWT

Introduction

Generating access tokens as JWT

Getting ready

How to do it...

How it works...

See also

Validating JWT tokens at the Resource Server side

Getting ready

How to do it...

How it works...

There's more...

See also

Adding custom claims on JWT

Getting ready

How to do it...

How it works...

See also

Asymmetric signing of a JWT token

Getting ready

How to do it...

How it works...

See also

Validating asymmetric signed JWT token

Getting ready

How to do it...

How it works...

See also

Using JWE to cryptographically protect JWT tokens

Getting ready

How to do it...

How it works...

See also

Using JWE at the Resource Server side

Getting ready

How to do it...

How it works...

See also

Using proof-of-possession key semantics on OAuth 2.0 Provider

Getting ready

How to do it...

How it works...

There's more...

See also

Using proof-of-possession key on the client side

Getting ready

How to do it...

How it works...

See also

OpenID Connect for Authentication

Introduction

Authenticating Google's users through Google OpenID Connect

Getting ready

How to do it...

How it works...

See also

Obtaining user information from Identity Provider

Getting ready

How to do it...

How it works...

There's more...

See also

Using Facebook to authenticate users

Getting ready

How to do it...

How it works...

See also

Using Google OpenID Connect with Spring Security 5

Getting ready

How to do it...

How it works...

See also

Using Microsoft and Google OpenID providers together with Spring Security 5

Getting ready

How to do it...

How it works...

See also

Implementing Mobile Clients

Introduction

Preparing an Android development environment

Getting ready

How to do it...

How it works...

Creating an Android OAuth 2.0 client using an Authorization Code with the system browser

Getting ready

How to do it...

How it works...

There's more...

See also

Creating an Android OAuth 2.0 client using the Implicit grant type with the system browser

Getting ready

How to do it...

How it works...

See also

Creating an Android OAuth 2.0 client using the embedded browser

Getting ready

How to do it...

How it works...

See also

Using the Password grant type for client apps provided by the OAuth 2 server

Getting ready

How to do it...

How it works...

There's more...

See also

Protecting an Android client with PKCE

Getting ready

How to do it...

How it works...

See also

Using dynamic client registration with mobile applications

Getting ready

How to do it...

How it works...

See also

Avoiding Common Vulnerabilities

Introduction

Validating the Resource Server audience

Getting ready

How to do it...

How it works...

Protecting Resource Server with scope validation

Getting ready

How to do it...

How it works...

Binding scopes with user roles to protect user's resources

Getting ready

How to do it...

How it works...

See also

Protecting the client against Authorization Code injection

Getting ready

How to do it...

How it works...

Protecting the Authorization Server from invalid redirection

Getting ready

How to do it...

How it works...

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部