-
Onboard
For Tech Teams
- Reduce initial time to productivity.
- Increase employee tenure.
- Plug-and-play into HR onboarding and career pathing programs.
- Customize for ad-hoc and cohort-based hiring approaches.
-
Upskill
For Tech Teams
- Upgrade and round out developer skills.
- Tailor to tech stack and specific project.
- Help teams, business units, centers of excellence and corporate tech universities.
-
Reskill
For Tech Teams
- Offer bootcamps to give employees a running start.
- Create immersive and cadenced learning journeys with guaranteed results.
- Supplement limited in-house L&D resources with all-inclusive programs to meet specific business goals.
-
Design
For Tech Teams
- Uplevel your existing tech learning framework.
- Extend HR efforts to provide growth opportunities within the organization.
- Prepare your team for an upcoming tech transformation.
Get your team started on a custom learning journey today!
Our Boulder, CO-based learning experts are ready to help!
Course Summary
The Introduction to OAuth 2 training course teaches developers all aspects of OAuth 2. OAuth 2 is a security protocol used across the web to protect Application Programming Interfaces (APIs) and enable applications to interact securely with services. In this two-day class developers will get a thorough overview of the OAuth 2 protocol, how it works, and why it works the way that it does.
The first day focuses on the OAuth 2 protocol itself and includes a hands-on laboratory where developers will build a complete OAuth ecosystem from scratch, including the client, authorization server, and protected resource. Next the course will cover the variety of OAuth flows and how to choose between them. The second day focuses on the protocols and world around OAuth, including OpenID Connect for identity, token management with revocation and introspection, token formats using JavaScript Object Notation (JSON) Web Token (JWT) and Javascript Object Signing and Encryption (JOSE), dynamic client registration, server discovery, user-managed access, and proof of possession tokens. This day’s labs concludes with a hands-on JWT creation and parsing as well as implementation of OpenID Connect on top of the OAuth 2 system from the previous day.
- Productivity Objectives:
- Examine OAuth 2 protocol flows.
- Interpret a deep understanding of the authorization code flow.
- Determine when to use which OAuth flow.
- Identify what OAuth doesn’t cover.
- Deduce how OpenID Connect is built on top of OAuth.
- Illustrate a familiarity with advanced topics including introspection, revocation, registration, discovery, User Managed Access (UMA), and Post Office Protocol (PoP).
Request Information
Get your team upskilled or reskilled today. Chat with one of our experts to create a custom training proposal. Fully customized at no additional cost.

If you are not completely satisfied with your training class, we'll give you your money back.




about our training
-
Real-World Content
Project-focused demos and labs using your tool stack and environment, not some canned "training room" lab.
-
Expert Practitioners
Industry experts with 15+ years of industry experience that bring their battle scars into the classroom.
-
Experiential Learning
More coding than lecture, coupled with architectural and design discussions.
-
Fully Customized
One-size-fits-all doesn't apply to training teams. That's where we come in!
What You'll Learn
In the Introduction to OAuth 2 training course, you'll learn:
- What is OAuth 20
- How did we solve API access without OAuth
- How OAuth protects APIs
- A history of OAuth
- What OAuth isn’t
- The authorization code flow
- Building an OAuth ecosystem (lab)
- Refresh tokens
- Scopes
- OAuth flows
- Implicit
- Client cridentials
- Password
- Assertion
- Native clients
- PKCE
- Choosing different OAuth flows
- JSON Web Tokens (JWT)
- JOSE
- Making JWTs (lab)
- User authentication
- What is Authentication?
- Can we build Authentication with OAuth?
- OpenID Connect
- ID Tokens
- UserInfo
- Adding OpenID Connect to OAuth (lab)
- Discovery
- Dynamic registration
- Token introspection
- Token revocation
- User-managed Access
- Proof of Possession
Real-world content
Project-focused demos and labs using your tool stack and environment, not some canned "training room" lab.
Expert Practitioners
Industry experts that bring their battle scars into the classroom.
Experiential Learning
More coding than lecture, coupled with architectural and design discussions.
Fully Customized
One-size-fits-all doesn't apply to training teams. That's where we come in!

Elite Instructor Program
We recently launched our internal Elite Instructor Program. The community driven instructor program is designed to support instructors in transforming students’ lives by consistently showing a world-class level of engagement, ability, and teaching prowess. Reach out today to learn more about our instructors.
Customized Technical Learning Solutions to Help Attract and Retain Talented Developers
Let DI help you design solutions to onboard, upskill or reskill your software development organization. Fully customized. 100% guaranteed.
DevelopIntelligence leads technical and software development learning programs for Fortune 500 companies. We provide learning solutions for hundreds of thousands of engineers for over 250 global brands.



“I appreciated the instructor’s technique of writing live code examples rather than using fixed slide decks to present the material.”
VMwareResources
Thank you for everyone who joined us this past year to hear about our proven methods of attracting and retaining tech talent.

- Boulder, Colorado Headquarters: 980 W. Dillon Road, Louisville, CO 80027
- 877-629-5631, 720-445-4360
© 2013 - 2020 DevelopIntelligence LLC - Privacy Policy