The A to Z of API AuthoriZation
APIs offer immense potential for app developers to build innovative tools leveraging a customer’s existing data. However, navigating the world of API authorization with its labyrinth of acronyms and protocol flows can be confusing. Have you got an API token or an access token? What’s the difference between 2-legged OAuth, 3-legged OAuth, and OpenID Connect? And how does this all protect my user’s passwords, while giving my apps a way to access their data? Get it right, and you unlock massive opportunities, but get it wrong and you can compromise your apps and your user’s data.
In this session well demystify key API authorization concepts, discuss how they relate to public Atlassian APIs (now and in the future), and describe best practices for keeping your apps secure.
Видео The A to Z of API AuthoriZation канала Atlassian
In this session well demystify key API authorization concepts, discuss how they relate to public Atlassian APIs (now and in the future), and describe best practices for keeping your apps secure.
Видео The A to Z of API AuthoriZation канала Atlassian
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![OAuth 2.0: An Overview](https://i.ytimg.com/vi/CPbvxxslDTU/default.jpg)
![Why do we have Authorization and NOT Authentication in API Requests](https://i.ytimg.com/vi/VIofwKpTOK8/default.jpg)
![How to Build an Effective API Security Strategy](https://i.ytimg.com/vi/D7AfQKxFC0U/default.jpg)
![Authentication on the Web (Sessions, Cookies, JWT, localStorage, and more)](https://i.ytimg.com/vi/2PPSXonhIck/default.jpg)
![OAuth 2.0 and OpenID Connect (in plain English)](https://i.ytimg.com/vi/996OiexHze0/default.jpg)
![](https://i.ytimg.com/vi/a3vBB6FjIj8/default.jpg)
![Securing the enterprise by securing APIs (Google Cloud Next '17)](https://i.ytimg.com/vi/hjLEIS661w0/default.jpg)
![Securing Your APIs with OAuth 2.0 - API Days](https://i.ytimg.com/vi/PfvSD6MmEmQ/default.jpg)
![System Design Interview: Design Netflix](https://i.ytimg.com/vi/VvZf7lISfgs/default.jpg)
![What is a REST API?](https://i.ytimg.com/vi/SLwpqD8n3d0/default.jpg)
![JWT AUTHENTICATION In ASP NET Core with Azure AD | Getting Started With ASP.NET Core Series](https://i.ytimg.com/vi/YGUgmWd9xaw/default.jpg)
![How to use headers in REST APIs? Different types of headers, how and where to use?](https://i.ytimg.com/vi/76CcJ90Lz4U/default.jpg)
![What Is A RESTful API? Explanation of REST & HTTP](https://i.ytimg.com/vi/Q-BpqyOT3a8/default.jpg)
![Intro to API Authentication Types Oauth, token HTTP Basic](https://i.ytimg.com/vi/XpEyRVEOFuU/default.jpg)
![POSTMAN BEGINNER TUTORIAL 19 💡API Authorization in Postman](https://i.ytimg.com/vi/z2c3ZBJlYKo/default.jpg)
![How to Delete Contacts in Salesforce Marketing Cloud](https://i.ytimg.com/vi/4ZzywRPvjBo/default.jpg)
![Designing the Right Security Architecture for your APIs (Cloud Next '19)](https://i.ytimg.com/vi/PRGm2l-YhV0/default.jpg)
![Advanced JAX-RS 22 - REST API Authentication Mechanisms](https://i.ytimg.com/vi/501dpx2IjGY/default.jpg)
![Authentication and Authorization in a Microservice Architecture | OAuth 2.0 | JWT](https://i.ytimg.com/vi/Rn8ts-3eayc/default.jpg)
![The 7 Deadly Sins of API Design by Luis Weir](https://i.ytimg.com/vi/Sx2_etbb9JA/default.jpg)