Softwarez.Info - Software's World!
OAuth2 and OIDC demystified with hands-on using Keycloak - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: OAuth2 and OIDC demystified with hands-on using Keycloak (/Thread-OAuth2-and-OIDC-demystified-with-hands-on-using-Keycloak)



OAuth2 and OIDC demystified with hands-on using Keycloak - OneDDL - 09-28-2024

[Image: 94eb3d71e9ea9682952f73a9471efbf0.jpeg]
Free Download OAuth2 and OIDC demystified with hands-on using Keycloak
Published 9/2024
Created by Zoran Petrovic
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 12 Lectures ( 44m ) | Size: 269 MB

Designed for Understanding OAuth2/OIDC: When to Use Flows and How They Work Using Low-Level HTTP Requests
What you'll learn:
Understand the core concepts of OAuth2 and OpenID Connect (OIDC)
Gain a clear understanding of OAuth2 and OIDC terminology, including roles, tokens, and scopes.
Develop the ability to choose the appropriate OAuth2 flow for different scenarios.
Learn to execute OAuth2 flows at a low level using direct HTTP requests.
Requirements:
You should have a basic understanding of HTTP. Some experience in software development is desirable
Description:
Welcome to "OAuth2 and OIDC Demystified". This course is designed to equip you with a deep understanding of the core concepts and essential details needed to effectively use OAuth2 and OIDC in real-world scenarios. It is intentionally short and to the point, since I value your time. You can always re-watch some parts if you find them harder to understand, and I recommend you to do that.What You'll Learn:Core Concepts and Terminology: Fundamental components of OAuth2 and OIDC, including roles, tokens and scopes. Understanding these basics will serve as the foundation for everything you do with OAuth2 and OIDC.Authorization Flows: Learn the different OAuth2 flows: Authorization Code (PKCE), Client Credentials, Device Code, Refresh Token, Implicit and Password. Discover when and why you should use each one, depending on your application's needs and security requirements.Low-Level OAuth2: Test OAuth2 flows using raw HTTP requests. By understanding how OAuth2 flows work on low-level (instead of using libraries), you'll be better prepared to troubleshoot issues and ensure secure communication.This course is intended for developers, architects, and IT professionals who are looking to deepen their knowledge of OAuth2 and OIDC. Whether you are integrating third-party authentication providers, securing APIs, or simply wanting to understand the technology better, this course has something for you.You should have a basic understanding of HTTP protocol and some experience in software development is desirable.This is NOT a course on how to use and configure Keycloak or any other identity provider, and this is NOT a course on how to use authentication libraries. The main goal is to understand OAuth2 protocol, how it works and how to use it.By the end of this course, you will have a strong grasp of OAuth2 and OIDC and be confident in choosing the right authorization flows.Join us on this journey to demystify OAuth2 and OIDC and take your authentication skills to the next level!
Who this course is for:
Software Developers, Solutions Architects and DevOps
Homepage

[To see links please register or login]






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable