Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with OAuth 2.0

Buy
Getting Started with OAuth 2.0, 9781449311605 (1449311601), O'Reilly, 2012
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers using these Google APIs were initially required to use proprietary technologies like ClientLogin and AuthSub. If these same developers wanted to integrate with APIs provided by Yahoo!, they needed to use Yahoo!’s BBAuth. The use of these proprietary authorization technologies made it challenging to build applications using APIs from multiple providers.
 
The development of OAuth 1.0 reduced many of the headaches for developers and allowed them to use a single authorization technology across hundreds of APIs on the Web. However, OAuth 1.0 came with some challenges as well—cryptographic signatures and limited definition of how to use it for authorizing applications not using a server-to-server web application flow. I’m delighted that the standardization of OAuth 2.0 is nearly complete, as it provides an authorization protocol that’s easy to use both for these types of applications and for a variety of other use cases.
 
Perhaps most exciting is the upcoming standardization of OpenID Connect—a protocol built on top of OAuth 2.0 to enable using the same identity to log in (authenticate) to multiple applications. While I’ve worked with hundreds of developers who have successfully built earlier versions of OpenID authentication into their web applications, it’s rarely been a very smooth process. Just as OAuth 2.0 makes authorization easier for developers, OpenID Connect does the same for authentication.
 
I hope this book gives you the foundation knowledge you need to work with OAuth 2.0 and OpenID Connect as the next-generation authorization and authentication technologies for the Web.
(HTML tags aren't allowed.)

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Pentaho Data Integration Beginner's Guide, Second Edition
Pentaho Data Integration Beginner's Guide, Second Edition

Get up and running with the Pentaho Data Integration tool using this hands-on, easy-to-read guide

Overview

  • Manipulate your data by exploring, transforming, validating, and integrating it
  • Learn to migrate data between applications
  • Explore several features of Pentaho Data...
Beginning SQL Server 2005 for Developers: From Novice to Professional
Beginning SQL Server 2005 for Developers: From Novice to Professional
Beginning SQL Server 2005 for Developers is for those people who see themselves as becoming
either developers, database administrators, or a mixture of both but have yet to tread that path
with SQL Server 2005. Whether you have no knowledge of databases, or have knowledge of
desktop databases such as MS Access, or even come from a
...

Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)
Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)

This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies....

AdWords For Dummies (Computer/Tech)
AdWords For Dummies (Computer/Tech)
Discover which keywords attract customers and make money

Use your $25 Google AdWords credit to start boosting your bottom line today!

What's the good word? It's AdWords, the marketing solution that helps turn clicks into cash by attracting the right visitors to your Web site. This book shows...

Competency-Based Human Resource Management
Competency-Based Human Resource Management
Filled with practical tools and aids to help HR professionals, this book explains how to reinvent the human resource department so that job competencies--rather than job descriptions--become the foundation for all HR efforts.

Force-fitting employees into a "job box" shortchanges both the employees and the organization,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy