RAR-files |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.rar |
400,000,000 |
D56B72AC |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r00 |
400,000,000 |
A9BEED3C |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r01 |
400,000,000 |
EF9B4A03 |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r02 |
400,000,000 |
3F74ADB8 |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r03 |
400,000,000 |
0E047EA9 |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r04 |
400,000,000 |
47416DFC |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r05 |
400,000,000 |
648A2573 |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r06 |
400,000,000 |
655EFAB0 |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r07 |
400,000,000 |
AB9D63BF |
udemy.the.nuts.and.bolts.of.oauth.20-udummy.r08 |
356,779,257 |
1F4078E0 |
|
Total size: |
3,956,779,257 |
|
|
Archived
files |
01-Intro_to_this_Course.mkv
[f23ef9ccf391ceaa]
|
51,847,766 |
099ED243 |
41-Contextually_Choosing_Token_Lifetimes.mkv
[c8244c3423bbf152]
|
111,175,965 |
1EE22DA5 |
20-Protecting_Tokens_in_the_Browser.mkv
[d9475c6ca1bcb66]
|
63,681,015 |
DFF44551 |
03-How_OAuth_Improves_Application_Security.mkv
[878c5253dbec314e]
|
62,749,753 |
F585E820 |
32-Reference_Tokens_vs_Self-Encoded_Tokens.mkv
[8ea3fe1dc6b472a1]
|
164,999,894 |
6FD436C5 |
27-How_ID_Tokens_are_Different_from_Access_Tokens.mkv
[27fcd4fb11fa655a]
|
50,702,225 |
79FE937F |
17-Refresh_Tokens_for_Native_Apps.mkv
[4f153c5a31b280e8]
|
49,008,899 |
0BB1A56F |
43-The_Problem_with_Local_Validation.mkv
[2710eba2f399fb2c]
|
98,319,537 |
7E8730F9 |
34-Pros_and_Cons_of_Self-Encoded_Tokens.mkv
[e0da3dbef3dcb2f9]
|
115,521,498 |
8B5D34DB |
26-What_is_an_ID_Token.mkv
[7b9a7befefd84281]
|
29,880,053 |
4B7AE8F1 |
39-Increasing_Security_with_Short_Token_Lifetimes.mkv
[426ddffef2761064]
|
50,014,162 |
A4110D00 |
06-Application_Types.mkv
[ec7a09baac271efb]
|
55,981,694 |
73D487B4 |
46-The_Purpose_of_OAuth_Scopes.mkv
[4cfd22cc9719280f]
|
30,491,927 |
9940E69C |
47-Defining_Scopes_for_your_API.mkv
[23e224255112bada]
|
110,638,901 |
0D77686D |
49-The_Future_of_OAuth_OAuth_2.1.mkv
[7847e76a77655099]
|
71,731,832 |
F6FBC2A5 |
05-Roles_in_OAuth.mkv
[42f9bc79fadb2549]
|
42,939,100 |
388BB67A |
08-Front_Channel_vs_Back_Channel.mkv
[8306b85221aea3fb]
|
72,597,255 |
8AA89B08 |
04-OAuth_vs_OpenID_Connect.mkv
[b71f75fed7c274dd]
|
50,727,466 |
1D169C25 |
12-Authorization_Code_Flow_for_Web_Applications.mkv
[bad9b7b3d228091f]
|
79,285,341 |
4AF8B462 |
16-Authorization_Code_Flow_for_Native_Apps.mkv
[42bbad8b9345f685]
|
85,883,514 |
A685ADDB |
25-Client_Credentials_Grant_for_Machine-to-Machine_Applications.mkv
[cd2e05b3921eb4c3]
|
23,934,624 |
9F1BB601 |
44-Token_Lifetime_Considerations.mkv
[2a57152c7aca097b]
|
18,237,267 |
DF44E22A |
45-How_Applications_can_Revoke_Access_Tokens.mkv
[69e5c3ac1226bb09]
|
55,226,904 |
67D1FDBC |
24-When_to_use_the_Client_Credentials_Grant.mkv
[cee55fde08a5b7a7]
|
21,460,785 |
62502FD1 |
18-Problems_with_the_Browser_Environment.mkv
[72b096fe82e2dbb1]
|
55,186,911 |
9142EAE8 |
31-Intro_to_Protecting_an_API_with_OAuth.mkv
[b41d19b6f81fd31a]
|
30,384,394 |
63163C77 |
35-The_Structure_of_a_JWT_Access_Token.mkv
[b6092d8f1d72d1a1]
|
256,294,762 |
0938CFA1 |
19-Authorization_Code_Flow_for_Single-Page_Applications.mkv
[b0bc77c7f6927914]
|
80,257,993 |
C7729A09 |
30-Validating_and_Using_an_ID_Token.mkv
[fea7d83249c74102]
|
152,445,369 |
C3C0EEA1 |
14-Redirect_URLs_for_Native_Apps.mkv
[44b1de6eacb285ae]
|
42,850,679 |
C8B7B56B |
36-Remote_Token_Introspection.mkv
[2336ee72723a8935]
|
109,973,893 |
243E3B09 |
02-A_Brief_History_of_OAuth.mkv
[f53d182a0361667a]
|
41,708,358 |
D3918BC0 |
21-Securing_the_Browser_with_a_Backend.mkv
[178a9062110c481c]
|
61,075,167 |
7DB0AD1B |
38-The_Best_of_Both_Worlds_Using_an_API_Gateway.mkv
[ffbbaaa74de61d81]
|
96,179,871 |
5862A514 |
42-Reasons_Why_an_Access_Token_May_become_Invalidated.mkv
[2a0dc1c8d001b0c6]
|
81,199,451 |
EDCCDB4F |
22-Limitations_of_IoT_and_Smarthome_Devices.mkv
[3cfab2281880a330]
|
89,553,761 |
CC471EA0 |
48-Prompting_the_User_for_Consent.mkv
[54e24eae56565720]
|
67,545,456 |
0ECF1599 |
11-Registering_an_Application.mkv
[785e9d5f99bea1d7]
|
49,961,802 |
8A87618F |
10-Introduction_to_OAuth_Clients.mkv
[3ef1ce8cf5458f09]
|
15,992,417 |
9EF62583 |
40-Improving_User_Experience_with_Long_Token_Lifetimes.mkv
[12abba40ee2f2f4c]
|
92,054,216 |
E84F392C |
29-Hybrid_OpenID_Connect_Flows.mkv
[e021f7e7bb6b0521]
|
106,219,535 |
A8FB735C |
51-Thank_You_for_Taking_the_Course.mkv
[93d9eb64eb675256]
|
15,053,717 |
D410F567 |
23-Device_Flow_for_Browserless_Devices.mkv
[c5ca9338430e4b18]
|
26,662,513 |
9ECDA330 |
28-Obtaining_an_ID_Token.mkv
[2bf1ff89d1436ce7]
|
127,877,220 |
09FF09D0 |
33-Pros_and_Cons_of_Reference_Tokens.mkv
[ef06601dfc38502a]
|
90,508,115 |
F57FF6F4 |
07-User_Consent.mkv
[b964f5959e1b82d9]
|
135,781,523 |
287DBB39 |
13-The_Unique_Issues_of_Native_Apps.mkv
[484cf0ab2a1f5ebf]
|
14,115,566 |
31D007EE |
09-Application_Identity.mkv
[4cf1e97f429de4cd]
|
167,701,900 |
7F831C4B |
37-Local_Token_Validation.mkv
[21cc85ce8a3c735a]
|
313,039,444 |
FB33A922 |
15-Browser_Security_for_Native_Apps.mkv
[563f296366450ff4]
|
50,926,666 |
5AC7F1BA |
50-Additional_Resources_and_Further_Reading.mkv
[4ed082ef8a8a53f3]
|
19,186,129 |
5998784E |
|
Total size: |
3,956,774,205 |
|
|