|
You are here |
blog.doyensec.com | ||
| | | | |
stack-auth.com
|
|
| | | | | Stack Auth is open-source authentication for the modern web. | |
| | | | |
www.cossacklabs.com
|
|
| | | | | How to implement OAuth in the context of mobile applications while avoiding security pitfalls? Practical steps on fortifying OAuth flow with PKCE, state parameter, managing secure redirections, and focusing on critical aspects during OAuth assessment in mobile environments. | |
| | | | |
philodev.one
|
|
| | | | | oAuth is a hard to get into because of its (necessary) complexity. A basic understanding of the standard flow and the actors involved can help to make better decisions and understand the security implications of the choices. | |
| | | | |
fhirblog.com
|
|
| | | If you've read the previous posts talking about OAuth2, then (hopefully) it's clear how a user can authorize an application to retrieve their data from some server without needing to expose their login credentials. The Authorization Server is the only component that needs to have the persons username and password (or whatever authorization method is... | ||