OAuth 2.0: Implicit, Authorization Code, and PKCE

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024
  • What would some of the OAuth 2.0 flows look like in a real-world scenario? Watch and learn about the implicit, authorization code, and pkce flows and see the evolution, then sign up for a free trial of PingOne at ow.ly/8VnY50CqDan!

Комментарии • 13

  • @BenglinTube
    @BenglinTube 3 года назад +14

    Who would have thought OAuth flow can be so entertaining to watch? Good job folks! 😂 Please raise some fund to turn this into an even more awesome version 👍👍👍

  • @Stan-vl1rq
    @Stan-vl1rq 3 года назад +4

    As someone learning the cloud tech, this makes so much sense.

  • @david2207
    @david2207 3 года назад +3

    Good job guys 👍🏻. Usually when I have to explain all this to people that are not familiar with it, I went with the example of a movie theater so far.

  • @CODEMENTAL
    @CODEMENTAL 2 года назад +5

    I still don't quite get PKCE, but I have left thoroughly entertained 😊 Nice video!

  • @yazraf
    @yazraf 3 года назад +3

    this is amazing

  • @jaydeepsuryawanshi5037
    @jaydeepsuryawanshi5037 2 года назад +1

    Very nice video guys..

  • @CoscuLeFay
    @CoscuLeFay 3 года назад +4

    that looks good to me

  • @GregVanGorp
    @GregVanGorp 3 года назад +2

    Is the client passcode (Bartender Cheese/Queso) different per exchange? What's preventing the hacker from just giving the stolen authorization code and letting the client fetch the authentication token for you? e.g Dog steals coin. Gives coin to bartender, bartender gets the ticket, and then gives beer to dog? I think I might be too wrapped up in the analogy...

    • @psychobuddha5379
      @psychobuddha5379 3 года назад +1

      I think that the hacker need to provide the secret code, with the authorization code, that is is the actual purpose of PKCE in this case.

  • @derelisnei
    @derelisnei 2 года назад +1

    Wow Awesome!!!

  • @salmanakash6837
    @salmanakash6837 2 года назад +1

    I was laughing seeing this tutorial...
    Amazing .. keep it up

  • @hiroshiohsuga1737
    @hiroshiohsuga1737 3 года назад +1

    PKCE 5:11