OAuth 2 0 and OpenID Connect for Single Page Applications Philippe De Ryck

Поделиться
HTML-код
  • Опубликовано: 5 янв 2025

Комментарии •

  • @TheMediinaa
    @TheMediinaa 6 месяцев назад +1

    I absolutely loved this presentation! It made so many things so much clearer.
    My friend and I are working on a SPA + REST API project, and we thought it was a good idea to add login with Google to it. I was aware of the OAuth2.0 and OpenID Connect specifications, and thought it was going to be easy, until I found myself in a situation I didn't even know had an official term to it - Backend For Frontend.
    Every tutorial on the internet shows how to add Google login to either a traditional application, where the backend returns plain HTML to the browser, or purely on a SPA frontend, like the theme of this talk.
    So I came here thinking the presentation would talk about my problem, whereas in reality, it talks about a purely frontend based application. Just to find out at the end, that what I'm trying to implement is indeed a backend for frontend.

  • @heshamamer3737
    @heshamamer3737 2 года назад +1

    Thanks for such a lean explanation, I loved every moment of it, and I hope that you know that you made things a lot clearer for me

  • @galilioXX
    @galilioXX 2 года назад +1

    What a great session!!
    Thanks a lot Philippe!

  • @waujito
    @waujito Год назад

    Thanks a lot for such a great explanation. It was extremly helpful for me! You described all my questions about authorization in SPA with microservices

  • @rapha5586
    @rapha5586 11 месяцев назад

    Super clean and to the point. Thanks!

  • @kpavankumar007
    @kpavankumar007 2 года назад +1

    wow ! such an amazing and simplified explanation .

  • @nhlm4257
    @nhlm4257 Год назад +2

    Any tips on videos on how to implement the BFF pattern? Preferably using Spring Boot.

  • @skapator
    @skapator Год назад +2

    How would the bff handle multiple calls for tolken refresh?
    Senario is, frontend sends 3-4 requests to get data.

  • @yosafatc.saputra5844
    @yosafatc.saputra5844 3 месяца назад

    Thank you, it's very detailed.

  • @gustabart
    @gustabart Год назад +1

    Great explanation, Thanks! I don't understand why using BFF is safer. An attacker could still steal the browser's cookies and compromise the system. That is, it indirectly continues to use the tokens.

    • @officialJoldag
      @officialJoldag Год назад

      I think, it's because you are able to set the cookie with httponly, so it is not accessible via scripts.

    • @Timo-iu4uc
      @Timo-iu4uc 4 месяца назад

      @@officialJoldag That's true. But the malicious code could execute any request and it would work, because the session cookie is sent to the backend automatically, right?

  • @venkatraohyd
    @venkatraohyd Год назад

    Nice and great explanation ❤

  • @Sanjay-pu4sp
    @Sanjay-pu4sp Год назад

    Fantastic explanation. Massive thanks!

  • @bruxelleskarim
    @bruxelleskarim Год назад

    Goeimorgen Philippe, Do you still suggest using a BFF (Backend For Frontend) or Token Handler when the Authorization Code Flow with PKCE is employed for SPAs (Single Page Applications)?

  • @osematouati2430
    @osematouati2430 Год назад

    Thanks a lot, great explanation

  • @tombalabomba3084
    @tombalabomba3084 9 месяцев назад +1

    I don't agree with the conclusion of this talk. The whole point of BFF and http-only auth cookies is to prevent an attacker that has gained acces to execute js code through an xss attack, to steal the auth-token from your storage and thereby execute requests on your behalf. If an attacker has managed to sucessfully gain access, he can execute api calls directly from the clients browser with or without bff.

  • @SunilMishra-s3m
    @SunilMishra-s3m Год назад

    Great Explanation!!

  • @hashamkhan7951
    @hashamkhan7951 5 месяцев назад

  • @alessandrolima4266
    @alessandrolima4266 6 месяцев назад

    amazing !

  • @sumitjoshi_01
    @sumitjoshi_01 Год назад

    Thanks for the great explanation. I just want to ask you one thing that how an Identity provider makes a POST request to frontend application in Step no 9 (authorization response), especially in SPA application? And if it is making post request to my server then how I will return to user browser? Please help me, I am trying to implement apple id SSO with openId connect.