Du er ikke logget ind
Beskrivelse
OAuth 2.0 Introduction to API Security with OAuth 2.0 This book is an exploration of OAuth 2.0 standard. You will learn what the standard is, where it used, and how it can be used. The roles of OAuth 2.0 standard are discussed in this book in detail. The various types of clients in OAuth 2.0 are also discussed. You will get to know these and how they operate. The client profiles are discussed in this section. The process of Authorization in OAuth 2.0 is also been discussed in detail, along with Endpoints in OAuth 2.0 so you will know how to work with these in your applications. The process by which Requests and Responses work in OAuth 2.0 are explored in detail. You will learn how these are sent and received, and the actions which are taken under different circumstances. The Endpoints for these are explored, along with grant requests and responses for the grant owner. After reading this book, you will know how to use DoorKeeper for the purpose of protecting the Grape API. Here is a preview of what you'll learn: Definition Roles of OAuth 2.0 Types of Clients in OAuth 2.0 Authorization in OAuth 2.0 Oath 2.0 Endpoints Requests and Responses in OAuth 2.0 Grant Request/Response for Resource Owner Password Credentials Using Doorkeeper to protect Grape API Download your copy of " OAuth 2.0" by scrolling up and clicking "Buy Now With 1-Click" button.