When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

Udemy logo

OAuth 2.0: The Complete Guide

Covering OAuth 2.0 Workflows, Endpoints, Scopes, Tokens: JWTs and API Security. Real-life examples included!

     
  • 4.2
  •  |
  • Reviews ( 97 )
₹1799

This Course Includes

  • iconudemy
  • icon4.2 (97 reviews )
  • icon2 total hours
  • iconenglish
  • iconOnline - Self Paced
  • iconcourse
  • iconUdemy

About OAuth 2.0: The Complete Guide

OAuth 2.0 has become the web-industry standard protocol for providing secure access to web APIs, allowing applications to access users' data without compromising security and actually passing their password around. Companies around the world add OAuth to their APIs to enable secure access from their own mobile apps and third-party IoT devices and even access to banking APIs. So if you think about the big names in the technology industry, you can pretty much bet they have OAuth implemented.

With that being said, it is pretty obvious that this skill will improve by a mile your software developer abilities and will make you much more valuable in the work field.

If you're building an API, you'll learn in this tutorial the differences and tradeoffs between different access token formats, including JWT, how to choose an appropriate access token lifetime, and how to design scopes to protect various parts of your APIs.

By the end of this course, you’ll understand:

The problems OAuth was created to solve

The actual types of workflows regarding OAuth detailed in steps

The basics of OAuth 2.0 including what it is, how it is used, and what it is used for.

OAuth 2.0 Endpoints that you can call

OAuth 2.0 Terminology and key components

Deep dive into tokens and their types

JWT and its structure and also how they work

So, if all of this sounds interesting, I look forward to seeing you guys in the lectures! :)

What You Will Learn?

  • Deep Understanding of the OAuth 2.0 Protocol.
  • Deep dive into Tokens, their Types and Lifetime.
  • How is OAuth actually working.
  • OAuth Grant Types.
  • What is JWT and its Structure.
  • Use OAuth to Protect your APIs.
  • OAuth Endpoints.
  • OAuth Scopes.
  • Hand-on practice examples to access Public APIs using OAuth 2.0.
  • Why Social and Internet Applications give us the option to sign up using other applications.