Next up
Implicit Flow
Continuing in
OAuth2 for Securing Web Applications: Part 1
This is a preview of subscription content
Your browser needs to be JavaScript capable to view this video
Try reloading this page, or reviewing your browser settings
In this segment we look at some web attacks that OAuth2 is designed to prevent. We look at the things we have to be careful of as developers to avoid these attacks.
Keywords
- OAuth2
- Authorization Code Flow
- State
- Redirect URI
- Cross-Site Request Forgery
- CSRF
- vulnerabilities
- security risks
About this video
- Author(s)
- Matthew Baker
- First online
- 05 August 2023
- DOI
- https://doi.org/10.1007/978-1-4842-9762-9_7
- Online ISBN
- 978-1-4842-9762-9
- Publisher
- Apress
- Copyright information
- © Matthew Baker 2023