What does this course offer?
Learn OAuth hands on by accessing Google GMail APIs. Follow the simple instructions so you understand OAuth.
Why this course?
The most popular mobile apps integrate with popular APIs such as those offered by Google. If this is a well-known fact, why do app developers not just do it? Many app developers are afraid of complicated OAuth integrations. Security is, in fact, the biggest hurdle for most mobile app developers. This course explains OAuth in simple terms. With the knowledge gained in this course, you can use the secret of best app developers out there and finally integrate your app with Google APIs.
Who should take this course?
Do you want to write best-selling iPhone and Android apps? The most popular mobile apps integrate with popular social APIs of Google, LinkedIn, Twitter and many more. If this is a well-known fact, why do app developers not just do it?
Do you want to start out on your own, as an entrepreneur, consultant or freelancer? Knowing API Security and OAuth allows you to realize the big vision of your company in the field of mobile apps, cloud apps and web APIs, such as Google, Paypal and LinkedIn.
Do you want to build exciting solutions with the next generation technology? Whether you are a web developer, mobile developer or API developer, an architect or embedded developer for the Internet of Things, today you need to know OAuth to build state of the art solutions.
You believe OAuth is complicated? OAuth may seem complex with flows and redirects going back and forth. This course will give you clarity by introducing the seemingly complicated material with many illustrations and animations. These illustrations clearly show all the involved interaction parties and the messages they exchange.
You want to learn the OAuth concepts efficiently? This course uses many animated diagrams and sequence diagrams. A good diagram says more than 1000 words. You will get hands-on experience
You want to use OAuth in your mobile app? If you want to access resources that are protected by OAuth, you need to get a token first, before you can access the resource. For this, you need to understand the OAuth flows and the dependencies between the steps of the flows.
This course is based on the bestselling book “OAuth 2.0: Getting Started in Web-API Security”. Before I tell you what is presented in the course, just read, what the audience thinks about the book.
Excellent review of the underlying components of OAuth, and the methods of deploying and using it. Love the sequence diagrams. The explanations of the differences between the pattern use cases is most helpful.
***** 5 Stars by A. on April 22, 2015
Great Book: A clear explanation of OAuth and its authentication flows. It provided great descriptions of the OpenId Connect and SAML2 extensions.
***** 5 Stars by Donald E. L. on March 2, 2015
Brief explanation of OAuth but clear and straightforward.
***** 5 Stars by G. S. on February 12, 2015
What are the requirements?
Gumroad Rental 4.99 USD one time
Gumroad Product 9.99 USD one time
Skillshare Membership 0.99 USD per month
Title: Hands On OAuth Tutorial – Access GMail