Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Introduction to OAuth 2

Course Summary

The Introduction to OAuth 2 training course is designed to demonstrate aspects of OAuth 2.

The course begins with an analysis of the OAuth 2 protocol itself and includes a hands-on laboratory where developers will build a complete OAuth ecosystem from scratch, including the client, authorization server, and protected resource. Next, it explores the variety of OAuth flows and how to choose between them. The course concludes with a hands-on JWT creation and parsing as well as implementation of OpenID Connect on top of the OAuth 2 system from the previous day.

Purpose
Learn how to build advanced web security with OAuth.
Audience
Developers of protected APIs or clients of those APIs, security architects.
Role
Business Analyst - Software Developer - System Administrator - Technical Manager - Web Developer
Skill Level
Intermediate
Style
Hack-a-thon - Learning Spikes - Workshops
Duration
2 Days
Related Technologies
Web Development | Secure Coding Training | Cybersecurity

 

Productivity Objectives
  • Examine OAuth 2 protocol flows
  • Interpret a deep understanding of the authorization code flow
  • Determine when to use which OAuth flow
  • Identify what OAuth doesn't cover
  • Deduce how OpenID Connect is built on top of OAuth
  • Illustrate a familiarity with advanced topics including introspection, revocation, registration, discovery, User Managed Access (UMA), and Post Office Protocol (PoP)

What You'll Learn:

In the Introduction to OAuth 2 training course, you'll learn:
  • What is OAuth 2?
  • How to Solve API Access without OAuth
  • How OAuth protects APIs
  • A History of OAuth
  • What OAuth isn't
  • The Authorization Code Flow
  • Build an OAuth Ecosystem (Lab)
  • Refresh tokens
  • Scopes
  • OAuth Flows
    • Implicit
    • Client Credentials
    • Password
    • Assertion
  • Native clients
    • PKCE
  • Choose Different OAuth Flows
  • JSON Web Tokens (JWT)
    • JOSE
  • Making JWTs (lab)
  • User Authentication
    • What is Authentication?
    • Can we build Authentication with OAuth?
  • OpenID Connect
    • ID Tokens
    • UserInfo
  • Adding OpenID Connect to OAuth (lab)
  • Discovery
  • Dynamic Registration
  • Token Introspection
  • Token Revocation
  • User-managed Access
  • Proof of Possession
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.