OAuth 2.0 in Action: Enhancing Application Security

Delegated Authorization

Step into the world of OAuth 2.0 - the gold standard of secure delegated access. The following articles hold the key to a vast array of knowledge about OAuth 2.0, a protocol used widely to secure APIs and ensure safe data access. Dive deep into its sophisticated framework that elegantly separates the role of the client from that of the resource owner. Whether you are a seasoned professional or a curious novice, this rich array of resources on OAuth 2.0 will navigate you through the intricacies of this security powerhouse. Embark on this knowledge expedition to strengthen your understanding of secure digital identities and access delegation.

JWT vs OAuth 2.0: Understanding the Key Differences

JWT vs OAuth 2.0: Understanding the Key Differences

The interplay of tokens and protocols has fundamentally transformed how we authenticate, authorize, and securely communicate data over the Internet. Two important players in this realm are JSON Web Tokens (JWT) and OAuth 2.0. Though they serve different purposes, there's often confusion about their functionalities and application. How do they differ? Can one replace the other?

The Purpose of JWT: Stateless Authentication

The Purpose of JWT: Stateless Authentication

JSON Web Token (JWT) allow you to establish stateless authentication. I explain why this is important and what's the fundamental difference to stateful authentication.

On Making Spring Security OAuth RFC-compliant

On Making Spring Security OAuth RFC-compliant

On Fixing Spring Security OAuth: I fixed a small HTTP header extractor for the Spring Security OAuth open source project recently. Here's what happened & what I learned...