Getting Started with OAuth 2.0

Overview

Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.

Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 ...

See more details below
Other sellers (Paperback)
  • All (14) from $12.46   
  • New (10) from $12.46   
  • Used (4) from $12.46   
Getting Started with OAuth 2.0

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.49
BN.com price
(Save 38%)$16.99 List Price

Overview

Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.

Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.

  • Understand OAuth 2.0’s role in authentication and authorization
  • Learn how OAuth’s Authorization Code flow helps you integrate data from different business applications
  • Discover why native mobile apps use OAuth differently than mobile web apps
  • Use OpenID Connect and eliminate the need to build your own authentication system
Read More Show Less

Product Details

  • ISBN-13: 9781449311605
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 3/2/2012
  • Edition number: 1
  • Pages: 82
  • Sales rank: 1,173,241
  • Product dimensions: 7.01 (w) x 9.17 (h) x 0.17 (d)

Meet the Author

Ryan Boyd is a developer advocate at Google focused on enabling developers to extend Google Apps and build businesses on top of Google technology. He previously worked on OpenSocial and led the developer relations team for Google’s AtomPub APIs. Prior to joining Google, Ryan worked in higher education as a web architect for RIT’s central web hosting environment and as web app developer building admissions and student systems.

Read More Show Less

Table of Contents

Preface;
Conventions Used in This Book;
Using Code Examples;
Safari® Books Online;
How to Contact Us;
Acknowledgments;
Chapter 1: Introduction;
1.1 How OAuth Was Born;
1.2 Why Developers Should Care About OAuth;
1.3 Why Don’t These APIs Just Use Passwords for Authorization?;
1.4 Terminology;
1.5 The Great Debate over Signatures;
1.6 Developer and Application Registration;
1.7 Client Profiles, Access Tokens, and Authorization Flows;
Chapter 2: Server-Side Web Application Flow;
2.1 When Should the Authorization Code Flow Be Used?;
2.2 Security Properties;
2.3 User Experience;
2.4 Step-by-Step;
2.5 How Can Access Be Revoked?;
Chapter 3: Client-Side Web Applications Flow;
3.1 When Should the Implicit Grant Flow Be Used?;
3.2 Limitations of the Implicit Grant Flow;
3.3 Security Properties;
3.4 User Experience;
3.5 Step-by-Step;
3.6 How Can Access Be Revoked?;
Chapter 4: Resource Owner Password Flow;
4.1 When Should the Resource Owner Password Flow Be Used?;
4.2 Security Properties;
4.3 User Experience;
4.4 Step-by-Step;
Chapter 5: Client Credentials Flow;
5.1 When Should the Client Credentials Flow Be Used?;
5.2 What APIs Support the Client Credentials Flow?;
5.3 How Does the Client Authenticate?;
5.4 Security Properties;
5.5 Step-by-Step;
5.6 When the Access Token Expires;
Chapter 6: Getting Access to User Data from Mobile Apps;
6.1 Why You Should Use OAuth for Native Mobile Apps;
6.2 What Flow Should Be Used for Native Mobile Apps?;
6.3 The (Ugly) Web Browser;
6.4 Enhanced Mobile App Authorization for Specific Providers;
Chapter 7: OpenID Connect Authentication;
7.1 ID Token;
7.2 Security Properties;
7.3 Obtaining User Authorization;
7.4 Check ID Endpoint;
7.5 UserInfo Endpoint;
7.6 Performance Improvements;
7.7 Practical OpenID Connect;
7.8 OpenID Connect Evolution;
Chapter 8: Tools and Libraries;
8.1 Google’s OAuth 2.0 Playground;
8.2 Google’s TokenInfo Endpoint;
8.3 Apigee’s Console;
8.4 Facebook’s Access Token Tool and Access Token Debugger;
8.5 Libraries;
8.6 Going Further;
References;
Specifications;
Vendor Documentation;
Mailing Lists;
Misc;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)