OAuth terminologies and flows explained - OAuth tutorial - Java Brains
HTML-код
- Опубликовано: 26 июн 2024
- In this tutorial, you’ll learn a couple of things. First you’ll learn about some key key terminologies used in OAuth. These are terms you will encounter in OAuth implementations, articles and pretty much anything to do with OAuth. And once you have learned that, you will understand how some of the important OAuth flows work in detail. OAuth has a lot of different variety of flows, but there are few key ones that you really should be knowing. Which you will by the end of this tutorial.
Java Brains website: javabrains.io
#JavaBrains #BrainBytes #WhatIs #OAuth #Java #Tutorial #Concept
Nobel Prize-winning physicist, Richard Feynman had once said: “You know you have mastered a skill, when you can teach it to a child”. Why? Because it forces yourself to understand the concept at a deeper level and simplify relationships and connections between ideas. Great Job Koushik! Thanks.
*Timestamps*
0:00 Intro
1:34 Term 1: Resource
2:24 Term 2: Resource Owner
3:14 Term 3: Resource Server
3:52 Term 4: Client
5:00 Who has the burden of security? (Ans: Resource Server)
6:51 Term 5: Authorization Server
7:54 OAuth Flow 1 *Authorization* *Code* *Flow*
14:09 OAuth Flow 2: *Implicit* *Flow*
15:50 Drawback of Implicit Flow
18:30 OAuth for authorization between services
19:24 OAuth Flow 3: *Client* *Credentials* *Flow* (for microservices)
22:20 Wrap-up
This is so appreciated 👍👏🤝🙏
23:10 Go rule the world
@Beau Ace Another bot comment "Joined Mar 6, 2021" reporting this account
How different it is from SAML
you all probably dont give a shit but does any of you know of a tool to log back into an Instagram account..?
I somehow forgot my password. I would love any assistance you can give me.
I just don't understand why some people would thumb down on this tutorial. In fact, all the tutorials from this channel are excellent. I learned a lot from them
I can't believe anyone would give this a thumbs up! Are you the author's cousin or something?
@@tombaxter2879 You mean he's got 4771 cousins or something? If you don't like this channel, show us yours.
@@phuang3 Relax. This particular video was bad, it doesn't mean the whole channel was bad.
Whose rule is it that says you can't comment on the quality of a video unless you, yourself have your own channel?
Grow up.
because they are history student came here to learn computer science
Some people don't like his accent sadly.
The tutorial is too good to having clearer view on Oauth flows. Hats off to the author
Hands down the best style of introducing technical material, that I have ever seen. Your videos are so easy to follow. I'm glad you start with concepts and examples, before going into the jargon.
Man, you have a gift for clearly explaining things, thank you very much for theses great videos.
Amazing explanation. Hope my son in college gets a "resource" (professor) like you. God Bless You
Amazing lesson JB once AGAIN..great stuff!!
Thank you very much again for this clean explanation. I appreciate you very much.
I must thank you for making me understand it in a better, simplified way. Your deep understanding on the topic is adorable. Once, again thank you
Your style of explanation / teaching is really top-notch! Great work
He made this so simple. He knows the art of teaching.
Thanks! I'm from Belarus and sometimes to hard to parse bad pronunciation, but yours is very clearly. Very useful explanation, one of the best learning channels!
This is an awesome explanation. It just had what I wanted to clarify.... Thbskd watching this video. thanks and kudos to you sir
Very well explained. One of the best videos that explains OAuth
Wow ...trust me i have seen 10+ videos on this topic on RUclips. But the way you are explaining... someone who is from commerce or arts background also will understand everything..😛
Thanks Koushik. Got to learn more about OAuth in meaningful and useful way. Please keep teaching more.
Respect for making such a video ! Superb skill of teaching.
You are a master of many concepts which many people want to learn.Kudos to You Kaushik.
Thanks Kaushik. Amazing video with the right set of analogies used at the right place. Kudos. 👍
Love the way the topic is presented!
Thanks Kaushik , This series on OAuth2 is amazin
dhur hala
I really loved it... the way you explained and it is clear and emphasizing examples !!!
Your videos are a blessing! Thank you!
Accidently found one video by Java brains, and this is my fifth video back to back, so additive ( things I understood in past with partial knowledge and getting confused time and again, explained o me here like a baby). I have seen many videos but no one explained like you did. Thanks a ton. Please put a link where views can make some donations if they are happy. I would love to do that
Crystal clean concepts as always :) Thanks Koushik!
Hey Guy
You are the best java channel out there! great job!
Superb Koushik. Really helpful. Thaks again.
This explanation is amazing. Thanks!
Always... best tutorials from Java Brains.
You are a lifeSaver Man. Thank You so Much Sir.
Explained very well. Thank you for clearing this concept
best explanation of oauth. thank you very much
Thank you so much for explaining it so beautifully
Great job, with you its easy to understand !
It makes sense now. Thanks!
The idea of picturizing the concepts and telling a story to explain the concepts is extremely helpful and captivating sir! Thanks a lot! I derive immense sense of satisfaction on viewing your videos. Any such videos on docker and kubernetes please?
awesome tutorial !!! It got a great understanding on this topic and it clarifies my doubts too. thank you.
Thanks for making it simple to understand the big concept .
Thank you!!!! I never know what "client" site means until now. There are so many things on the internet, and unfortunately people just assume it's common knowledge and don't bother explain them, which makes the process so much harder and frustrating. Thank you for taking the time
Client in any concept is the service(person, program, computer, platform) that requests something from some distributed remote server.
Thank you for your great efforts . you are the best to simplify such complex concepts
Thanks Kaushik , was eagerly waiting for this video
Very good and crystal clear explanation with good analogy. Thanks for sharing this core concept
Informative and useful!!!!
Great job. Thanks a lot for making this video.
You are a supreme teacher!
Great explanation! Thank you dudee✨
Awesome video, thanks !!
Can you also cover concept of challenge in OAuth, and how enterprise SSO works with OAuth.
Loved your awesome explanation!!
You are amazing bro. Thank you for everything
Thanks for the effort, very well explained.
Great style to explain!
Excellent explanation in details..!! Thank you..:)
Nice work. Thank you!
Great explanation Kaushik! The animations makes the illustrations way better. I would love to see you do a system design playlist which can go over the web architecture and design of various large scale applications like Netflix, Uber and Facebook. Most videos on youtube are done on the white board. It will be great if you can do one with animations. Thanks!
Great stuff man You helped clear my interview. Got the offer from company 🔥
your tutorials are awesome ....
This is a great tutorial. Thanks
Awesome Explanation !!
You are the BEST!
wow...very good explanations...i really enjoyed your teaching style!!..Thanks for making such a good efforts!
Wow, amazing explanation 🙏
You made this topic very easy to understand.. nice 👌
Thanks! lucid explanation, well presented. Slightly J as well :)
Excellent explanation, before this video series, i always afraid about Spring Security. many thanks
Excellent tutorial!!
You, sir, are a legend.
Brilliant explanation 💯💯
Well explained. Thanks!
Amazing presentation skills 👍
great respect, It is an easy to start tutorial.
Very well explained, thanks
Excellent content! Kudos my friend
Hi Kaushik. Thanks a lot for providing such great content. You are doing great service to the community.
Can you please release few videos on saml as well ? What is saml and how does it differ from oauth and how to implement it using spring boot .
very nice tutorial, thanks so much
Great Stuff. Thank you
Superb explanation
Very nice introduction sir. I love your teachings. It helps me so much in understanding complex concepts which seems very difficult to me before.
Sir, as honest request, can you please teach the implementation (demo) on the three flows you mentioned in this tutorial. Please sir👏
And thanks so much for these lessons.
Hi there, thanks for your amazing tutorials, they are very helpful!
One question, in the first OAuth flow (the one with the authorization token in the middle) once the client gets his access token, is it short-lived as well as OAuth flow 2? or does it last longer? or forever?
thanks again! Cheers!
Federico from Argentina :)
Amazing explanation
Hello, Thank you for your great efforts,
could you please cover sso with active Directory and Apache server ?
it will be great if you start a series on SOLID and Design Pattern in Java/any oops language. I know there are lots of material out there on internet related to these but I believe your way of teaching style will help out lots of ppl. and if you do please try to make each SOLID principle example not related to each topic. Thanks
Thanks for the tutorial. Please make another one on OpenID Connect protocol.
Finally found an Indian that makes sense :) Thank you! Subscribed.
Thank you so much
thanks brother, good tutorial
Thank you sir, could you please cover open id connect as well.
I think this is one of the best explanations so far. Is there a similar video on SAML and OIDC flow on your channel?
Thanks Kaushik for such a wonderful video very clearly explained like you always do.
I just wanted to know why implicit flow is less secured??
although in both kind of flows(authorization and implicit flow) client application has access token which can be used to access the protected resource from resource server.
very well explained.
awesome tutorial
Thanks. It was Brilliant
very nice video. Doupts are cleared. Subscribed and liked. 👍
Great! Thanks
Loved watching it! Can you create a single flow chart showing all the flows in one frame ? for non-implicit and implicit flows ?
Thanks, very helpful video! A few questions on the third flow, Client Credentials:
1. You mention that micro service 2 has an authentication server. But in the terminology we only talked about an authorization server--is this indeed a different thing, or did you mean to say authorization and not authentication?
2. In the second step, after MS1 goes to the MS2 Auth server, it receives an access token for, you say, only the API calls that it should have access to. But how does the auth server know what MS1 should have access to? My guess here is that this is indeed an authentication server, and that the server is meant to know ahead of time who MS1 is and what kind of access it should have, and that this is what is meant by a super trustworthy client, but I'd like to confirm if this is correct.
great explanation
Thumb up Kaushik :) Thank you
Thank you so much.
Nicely explained. Just one point to add..the exchange of token in authorization flow happens from a server to a token end point. The call is not from browser.