OAuth2 for Securing Web Applications: Part 1

Authorization Code Flow

Your browser needs to be JavaScript capable to view this video

Try reloading this page, or reviewing your browser settings

In this segment we walk through the OAuth2 Authorization Code flow. We look at the GET and POST requests that are made and that data that is sent.

Keywords

  • OAuth2
  • Authorization Code Flow
  • Access Token
  • Authorization Code
  • authorize endpoint
  • token endpoint

About this video

Author(s)
Matthew Baker
First online
05 August 2023
DOI
https://doi.org/10.1007/978-1-4842-9762-9_6
Online ISBN
978-1-4842-9762-9
Publisher
Apress
Copyright information
© Matthew Baker 2023