null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

OAuth 2 in Action

List Price: $49.99
SKU:
9781617293276
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Justin Richer, Antonio Sanso
    Format:
    Paperback
    Pages:
    360
    Publisher:
    Manning (March 18, 2017)
    Language:
    English
    ISBN-13:
    9781617293276
    ISBN-10:
    161729327X
    Weight:
    19.84oz
    Dimensions:
    7.38" x 9.25" x 0.8"
    File:
    Eloquence-SimonSchuster_04022026_P9912986_onix30_Complete-20260402.xml
    Folder:
    Eloquence
    List Price:
    $49.99
    Case Pack:
    20
    As low as:
    $44.99
    Publisher Identifier:
    P-SS
    Discount Code:
    G
    Pub Discount:
    37
    Imprint:
    Manning
  • Overview

    Summary

    OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    About the Technology

    Think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.

    About the Book

    OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.

    What's Inside

    • Covers OAuth 2 protocol and design
    • Authorization with OAuth 2
    • OpenID Connect and User-Managed Access
    • Implementation risks
    • JOSE, introspection, revocation, and registration
    • Protecting and accessing REST APIs

    About the Reader

    Readers need basic programming skills and knowledge of HTTP and JSON.

    About the Author

    Justin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.

    Table of Contents

      Part 1 - First steps

    1. What is OAuth 2.0 and why should you care?
    2. The OAuth dance
    3. Part 2 - Building an OAuth 2 environment

    4. Building a simple OAuth client
    5. Building a simple OAuth protected resource
    6. Building a simple OAuth authorization server
    7. OAuth 2.0 in the real world
    8. Part 3 - OAuth 2 implementation and vulnerabilities

    9. Common client vulnerabilities
    10. Common protected resources vulnerabilities
    11. Common authorization server vulnerabilities
    12. Common OAuth token vulnerabilities
    13. Part 4 - Taking OAuth further

    14. OAuth tokens
    15. Dynamic client registration
    16. User authentication with OAuth 2.0
    17. Protocols and profiles using OAuth 2.0
    18. Beyond bearer tokens
    19. Summary and conclusions