OAuth 2.0 explained with examples
HTML-код
- Опубликовано: 12 сен 2023
- Welcome to the ultimate guide on OAuth 2.0! In this 10-minute video, we'll unravel the complexities of OAuth 2.0, exploring its fundamental workings, identity providers, access tokens, the four types of OAuth flows, and its integration with JWT. Whether you're a seasoned developer or new to the world of digital security, this video will equip you with the knowledge you need.
🔐 Topics Covered:
OAuth 2.0 Basics
Identity Providers
Access Tokens Explained
Deep Dive into OAuth Flows
OAuth vs. Authentication
JWT Integration
🚀 Enhance your app development skills and bolster your understanding of OAuth 2.0-crucial for modern digital security. Hit the "Like" button, subscribe for more tech insights, and let's dive right in!
OAuth Flow Graphic Credit: dev.to/hem/oauth-2-0-flows-ex...
►LinkedIn: / bytemonk
System Design Interview Basics Playlist:
► • System Design Intervie...
AWS Certification:
►AWS Certified Cloud Practioner: • How to Pass AWS Certif...
►AWS Certified Solution Architect Associate: • How to Pass AWS Certif...
►AWS Certified Solution Architect Professional: • How to Pass AWS Certif...
Just found this channel and it's amazing. Keep it up man, you're providing tons of value to the software design industry.
Been searching for an easy to understand visual of OAuth...and this is one of the best videos by far! Thank you!
Same here...I needed the visuals for clarity.
Great explanation with nice animation showing all the steps!! Thanks!
Excellent explanation on OAuth concepts in plain language to reach broader audiences. Thank you!
I just recently founded your channel andI'm amazed! Keep up the great work! God bless!
Best channel So far in terms of explanation in short duration on basic topics… kudos🔥
I'm sorry, but you are truly a genius. Your ability to explain all these various different topics and technologies is absolutely remarkable. It is very clear and comprehensible. You are extremely extremely talented, not only in your grasp of technology but in your ability to communicate and convey your knowledge in a manner that others can easily consume and comprehend. Bravo! Bravo! Once again, one of the most talented individuals I have ever seen on the internet.
Thank you so much for this lovely comment and your support 🙏
+100
@@ByteMonk You are really good most of my doubts got cleared .
why are you sorry for a compliment 😀
@@rpvaghasiyais it not a criminal offence to compliment? 😅
Underrated channel. You'll be having thousands of views in no time. Keep it up.
Brilliant explanation that even a layman like me can understand these concepts to some extent atleast .. thank you so much 🙏
Oauth 2.0 is very well explained in this video. Thank you!
Your video editing skills are amazed brother and colors are great
This is an awesome video, very detailed. Thanks for sharing !!!
precise and well explained with well animations👍
Great Explanation !!!
Nice and elegant explanation. Thanks 👍
very precise nice expalnation thanku so much
How the resource-server will validate the token? Do the resource server still need to connect to authoriztionserver to get the token validated, once get validated it will fetch the access/permission details from the token?
excellent, thank you
a minor audio improvement suggestion for your videos. Applying an EQ which removes frequencies below 80 Hz or 90 Hz (High pass filter), will remove the boominess in your voice and give more clarity and comfortable listening experience.
Thanks for the tips!
Would love to connect with you sometime to ensure my audio processing is correct
Excellent video on OAuth 2.0, but small confusion at 5:15 convert access token encodes to JWT
what if i wanted to authorize which does not uses application of the authorization server i.e, you said in the example that google authorization to access google calendar in an app but what if my app doesn't uses any of those?
This is too good! Subscribed 😊
Thank you so much 😁
Should there be an arrow or two between auth and resource servers?
hello
currently i worked with django application & i have one query about authentications
is oauth2.0 is more secure then session ??
because currently i using session authentication flow that return session key when we pass user name or password
The Access token is not generated the way it has been represented. First an Authorization Code is generated and sent to the client app via the user agent. The authorization code is then sent by the client app directly with the the AS to generate the access token which is then used to access the resources.
How does the resource server variefies/validates the access/jwt token?
that was soo good!
nice explanation
I love the animations explaining how it works. May I know what app you use for these?
FCP, Adobe, Photoshop, Ppro. Takes about 10 hours for a 5-10 minutes video :)
@@ByteMonk I'd say it's worth it.
good explanation
How did you creat the OAuth 2.0 flows?
@ByteMonk, just a small piece of feedback: when listening to your videos with headphones, the music at the end is noticeably louder than your voice. The difference in volume makes it uncomfortable for the ears. It would be helpful if the music volume was lower, or at least not louder than your voice, for a more comfortable listening experience. Thank you!
Thank you 🙏
Thanks! Good explanation. Could you do a video on CA certificates or self-signed certificates?
Here :) ruclips.net/video/BQwKZ6zfyk0/видео.html You may also checkout relevant videos in the playlist in description.
I am not clear how does resource server validates token. Video doesnt mention any interaction between resource server and authorization server.
this is my confusion as well
@@abimanoharan2378 i got it. Token provided by authorization server has the information that resource server needs to contact authrization server. So when resource server receives token, it parses it and then uses that info to connect to auth server and validates the authenticity of token.
Thanks man for the explanation, I have one request do you have any research papers related to 0auth 1.0 and 0auth 2.0, any reference would work also, I would be very helpful to you, Thanks again.
Thank you! Its primarily based on my previous experience with OAuth and SSO in general. Unfortunately I did not maintain the list of papers and articles I went thru to make this video.
but once the client app has that token, it can request any information Google stores about the user??? it can consult his emails? his calendar? his maps history??? so instead of signing up in that web app filling a basic form with basic personal data, we use Oauth with Google (in this example) so the wep app can retrieve A LOT MORE INFORMATION about the user??!
Whenever you grant it access it shows what information the app wants to access. It doesn't get everything
Hey can you make one for macaroons as well. There aren't enough resources for it online
JWT is not a protocol. OAuth2.0 is protocol. JWT is used like access card which holds the required information for authorization.
Can you do 1 video on SAML?
SAML video just released!
@@ByteMonk awesome.