Next up
Security Pitfalls
Continuing in
OAuth2 for Securing Web Applications: Part 1
This is a preview of subscription content
Your browser needs to be JavaScript capable to view this video
Try reloading this page, or reviewing your browser settings
In this segment we walk through the OAuth2 Authorization Code flow. We look at the GET and POST requests that are made and that data that is sent.
Keywords
- OAuth2
- Authorization Code Flow
- Access Token
- Authorization Code
- authorize endpoint
- token endpoint
About this video
- Author(s)
- Matthew Baker
- First online
- 05 August 2023
- DOI
- https://doi.org/10.1007/978-1-4842-9762-9_6
- Online ISBN
- 978-1-4842-9762-9
- Publisher
- Apress
- Copyright information
- © Matthew Baker 2023