Introducción a OAuth 2.0 y OIDC
¿Qué aprenderas en este curso?
¿Qué es la autenticación?
¿Qué es la autorización?
¿Por qué son importantes OAuth y OIDC?
Preview: protección de un endpoint
OAuth 2.0 y OIDC en acción
JSON Web Tokens
¿Qué es un JSON Web Token?
Sesiones vs. Tokens
Firmando un JSON Web Token
Verificando un JSON Web Token
Quiz: JSON Web Tokens
Open Authorization 2.0
¿Qué es OAuth 2.0?
Flujos en OAuth 2.0
¿Cómo elegir el flujo adecuado?
Spotify: Authorization Code Flow
Twitter: Authorization Code Flow with PKCE
Twitch: Implicit Grant Flow
Discord: Client Credentials Grant
Auth0: Resource Owner Password Flow
Quiz: Open Authorization 2.0
Open ID Connect
¿Qué es OpenID Connect?
Auth0: Implicit Flow with Form Post
Curity: Hybrid Flow
Quiz: Open ID Connect
OAuth y OIDC en producción
¿Cuándo no son convenientes los JWT?
¿Qué debo tener en cuenta al usar OAuth 2.0?
Autenticación en minutos con NextAuth
Toma el Curso Práctico de Auth0
You don't have access to this class
Keep learning! Join and start boosting your career
Implementing Open Authorization (OAuth) in your projects can be a complex task, but by following certain guidelines, you can ensure that you do it efficiently and securely. Here are some key aspects to consider during this process.
When creating clients on different services to use OAuth, it is crucial to follow several steps to ensure the reliability of the system:
Tokens used in the authorization process should be stored in secure locations. It is recommended to use:
These measures prevent unauthorized access and protect the integrity of the user's session.
A session can expire, and it is essential to have a plan to handle these situations without frustrating users:
Although OAuth is a powerful tool, it is not always the best option for all projects. Consider the following before implementing it:
These recommendations will guide you to make informed decisions on when and how to use OAuth, ensuring that you provide your users with a secure and efficient experience. Encourage you to continue learning and implementing authentication in an optimal way!
Contributions 1
Questions 0
Want to see more contributions, questions and answers from the community?