Artificial intelligence is an area that many organizations are looking to take advantage of. Listen as CBT Nuggets trainer Ben Finkel discusses the implications of AI’s infusion into the Microsoft Azure platform and how it can affect your business in this recent webinar recording.
The phrase “OAuth 2.0 is an authorization framework, not an authentication framework” comes up a lot when you’re researching OAuth 2.0. It can be tiresome, because it’s often offered up without any context. It’s a nice statement, but what exactly does it mean?
In this installment, Ben looks at GitHub as an authentication option to give our users their choice of service providers. He accomplishes this by adjusting Google OAuth functions, reassigning endpoints for GitHub, updating the calls, and finally, updating oauth.py file.
Ben completes the third part of the OAuth Dance by importing two new libraries, moving client variables into place, adding endpoints and objects, and getting the GetAccessToken function into place. Finishing the Dance, Ben packs up the information and returns it back up the chain to deploy to the Cloud Platform and see it in action.
In the second part of the OAuth Dance, Ben circles back to the “state token,” explaining the importance of the “state token” in remembering the application state, how to protect against Cross-Site Request Forgery (CSRF), and why it provides a more user-friendly interface. Read more about the state token in the latest installment of this tutorial.
Ben initiates the first leg of the OAuth Dance, the User Authorization Grant, or the phase where the user gives the provider permission to share data.
It’s finally time to start running some actual code with the help of Google, Python, and this latest post on authentication!
It’s time to get visual, thanks to a handy application aptly named, OAuth 2.0 Playground.
In Ben’s previous post he gave an abstract overview of the OAuth 2.0 “dance.” In this post, he dives deeper into the process, every step of the way.
This is part one of a 10-part blog series from Ben Finkel addressing the challenges, solutions, and implementation of sound authentication.