How to Set up a React Native Application to Work with OAuth

Securing React Native with OAuth, we will set up a React Native application to work with OAuth. We’ll use FusionAuth for auth, but the React Native code should work with any OAuth compliant server.

How to Securely Implement OAuth in Vue.js

In this article, we will discuss the step-by-step process of implementing the OAuth Authorization Code Grant in a Vue.js app. We’ll use FusionAuth as the IdP and also show you how to configure FusionAuth.

Why is my fetch request to OAuth server being blocked by CORS?

How to send a cross origin request to a server using the form tag. General information about CORS and the Same Origin Policy in browsers.

How to Build an OAuth 2.0 client application in Go

In this article, we’ll build an OAuth 2.0 client application in Go and use it to access our user data in multiple services. OAuth 2.0 in Golang

API Authentication: Implementation of Best Practices

This article addresses a number of the best practices for implementing API security, including OAuth 2.0, API keys, usernames and passwords, and more. API Authentication: Implementation of Best Practices

Create a React App With Typescript, Redux and OAuth 2.0

In this tutorial we will create a React app using the official Redux+Typescript template and add OAuth 2.0 user authorization. The OAuth 2.0 authorization in this tutorial is used to connect to Spotify’s Web API, but can be used for any service with the same authorization flow.

How to Think About OAuth Security

In this talk, Aaron Parecki, a contributor to the OAuth specifications, provides a summary of the recent updates to the OAuth 2.0 Security Best Current Practice spec, and sheds some light on the vulnerabilities and weaknesses that led to some of the changes. You'll learn how to look for potential flaws and what it takes to build a secure OAuth implementation.

Customizing Login Page for Keycloak

Customizing Login Page for Keycloak. Learn how to change the default login page for Keycloak and add our customizations.

Missing the Point in Securing OAuth 2.0

Having a confidential client is less important than one would think. On the other hand, mitigating authorization code injection attacks should be prioritized as much as possible

Connecting Vue.js with OAuth Based API

I'm 99% sure that you've already used an OAuth based API. > 👉 If you signed up with your GitHub account on Hackernoon, you've used the GitHub API using their implementation of OAuth2. Every time you sign-in with Google (or Facebook) on a website, you are using OAuth2 as well.

Simple OAuth 2.0 Implementation

OAuth is an open authorization protocol that allows consumer applications on Web platforms such as Twitter, GitHub, or others to access the resource owner’s resources. The IETF OAuth Working Group developed OAuth 2.0 in 2012.

A Quick Reference Guide to Strong Authorization Terminology

In this article, learn more about security and authentication terms like 2-factor, 2-step, and multi-factor authentication, SMS, OAUTH and more.

Using Subdomain Takeovers to Attack SSO

This article explains three methods of SSOs—cookie-sharing, SAML, and OAuth—and explains how subdomain takeover occurs and how to prevent it.

OAuth 2.0 Patterns with Spring Cloud Gateway

OAuth 2.0 Patterns with Spring Cloud Gateway. Learn how to implement real world use cases with Spring Boot and Spring Cloud Gateway. You will use Spring Cloud Gateway for routing to traditional Servlet API microservices, and you will learn the required configuration for these three common OAuth2 patterns, using Okta as authorization server

Jakarta Security Et REST Dans Le Cloud Partie 3 : Connaître OAuth2

Bien qu'elle soit un aspect essentiel, la sécurité est un sujet peu discuté dans l'industrie du développement logiciel. En conséquence, de nombreuses décisions sont prises sans tenir compte de cette question. Il s'agit d'une série d'articles qui parlent de la sécurité dans le monde Jakarta EE pour des microservices dans le cloud. Dans cette partie, nous parlons d'intégrer OAuth2.

Jakarta Security Et REST Dans Le Cloud Partie 4: De JWT Avec OAuth 2

Bien qu’elle soit un aspect essentiel, la sécurité est un sujet peu discuté dans l’industrie du développement logiciel. En conséquence, de nombreuses décisions sont prises sans tenir compte de cette question. Il s'agit d'une série d'articles qui parlent de la sécurité dans le monde Jakarta EE pour des microservices dans le cloud. Dans cette partie, nous parlons d'intégration OAuth2 avec JWT.

Customizing Themes for Keycloak

Keycloak is an open-source identity and access management or IAM solution, that can be used as a third-party authorization server to manage our web or mobile applications' authentication and authorization requirements. In this tutorial, we'll focus on how we can customize the theme for our Keycloak server so that we can have a different look and feel for our end-user facing web pages.

OAuth 2.0 Resource Server With Spring Security 5

OAuth 2.0 Resource Server With Spring Security 5. Learn how to configure a Spring Security based resource server application for validating JWT as well as opaque tokens.

API Security Weekly: Issue #95

This week, look at recent vulnerabilities in Zoom and OkCupid, progress on the draft for OAuth 2.1, and a video tutorial on discovering leaky APIs.

What is the difference between OAuth1 and OAuth2?

OAuth1 was published in 2010, and OAuth2 is a complete rewrite of OAuth1 released in 2012. The following section will go over the most significant needs that led to this rewrite, along with the change associated to address them.