OAuth 2 0 and OpenID Connect for Single Page Applications Philippe De Ryck

  Рет қаралды 12,596

OWASP Foundation

OWASP Foundation

2 жыл бұрын

-
Managed by the OWASP® Foundation
owasp.org/

Пікірлер: 21
@TheMediinaa
@TheMediinaa Ай бұрын
I absolutely loved this presentation! It made so many things so much clearer. My friend and I are working on a SPA + REST API project, and we thought it was a good idea to add login with Google to it. I was aware of the OAuth2.0 and OpenID Connect specifications, and thought it was going to be easy, until I found myself in a situation I didn't even know had an official term to it - Backend For Frontend. Every tutorial on the internet shows how to add Google login to either a traditional application, where the backend returns plain HTML to the browser, or purely on a SPA frontend, like the theme of this talk. So I came here thinking the presentation would talk about my problem, whereas in reality, it talks about a purely frontend based application. Just to find out at the end, that what I'm trying to implement is indeed a backend for frontend.
@heshamamer3737
@heshamamer3737 Жыл бұрын
Thanks for such a lean explanation, I loved every moment of it, and I hope that you know that you made things a lot clearer for me
@galilioXX
@galilioXX Жыл бұрын
What a great session!! Thanks a lot Philippe!
@vvetrovv
@vvetrovv Жыл бұрын
Thanks a lot for such a great explanation. It was extremly helpful for me! You described all my questions about authorization in SPA with microservices
@rapha5586
@rapha5586 6 ай бұрын
Super clean and to the point. Thanks!
@kpavankumar007
@kpavankumar007 Жыл бұрын
wow ! such an amazing and simplified explanation .
@Sanjay-pu4sp
@Sanjay-pu4sp Жыл бұрын
Fantastic explanation. Massive thanks!
@vinaykasireddy
@vinaykasireddy Жыл бұрын
Excellent and elegant explaination
@osematouati2430
@osematouati2430 6 ай бұрын
Thanks a lot, great explanation
@venkatraohyd
@venkatraohyd 8 ай бұрын
Nice and great explanation ❤
@alessandrolima4266
@alessandrolima4266 Ай бұрын
amazing !
@user-xk4tf6wx7w
@user-xk4tf6wx7w Жыл бұрын
Great Explanation!!
@shanescad2384
@shanescad2384 3 ай бұрын
Thanks for sharing! However do you have a tutorial which implements Backend For Frontend (BFF) framework with Authorization code with PKCE in addition to this tutorial? It is unsafe to store access token on browser.
@hashamkhan7951
@hashamkhan7951 16 күн бұрын
@nhlm4257
@nhlm4257 Жыл бұрын
Any tips on videos on how to implement the BFF pattern? Preferably using Spring Boot.
@skapator
@skapator Жыл бұрын
How would the bff handle multiple calls for tolken refresh? Senario is, frontend sends 3-4 requests to get data.
@sumitjoshi_01
@sumitjoshi_01 Жыл бұрын
Thanks for the great explanation. I just want to ask you one thing that how an Identity provider makes a POST request to frontend application in Step no 9 (authorization response), especially in SPA application? And if it is making post request to my server then how I will return to user browser? Please help me, I am trying to implement apple id SSO with openId connect.
@bruxelleskarim
@bruxelleskarim 10 ай бұрын
Goeimorgen Philippe, Do you still suggest using a BFF (Backend For Frontend) or Token Handler when the Authorization Code Flow with PKCE is employed for SPAs (Single Page Applications)?
@gustabart
@gustabart 8 ай бұрын
Great explanation, Thanks! I don't understand why using BFF is safer. An attacker could still steal the browser's cookies and compromise the system. That is, it indirectly continues to use the tokens.
@officialJoldag
@officialJoldag 8 ай бұрын
I think, it's because you are able to set the cookie with httponly, so it is not accessible via scripts.
@tombalabomba3084
@tombalabomba3084 4 ай бұрын
I don't agree with the conclusion of this talk. The whole point of BFF and http-only auth cookies is to prevent an attacker that has gained acces to execute js code through an xss attack, to steal the auth-token from your storage and thereby execute requests on your behalf. If an attacker has managed to sucessfully gain access, he can execute api calls directly from the clients browser with or without bff.
Everything You Ever Wanted to Know About OAuth and OIDC
33:21
WORLD'S SHORTEST WOMAN
00:58
Stokes Twins
Рет қаралды 88 МЛН
SAML vs OAuth vs OIDC (explained simply!)
20:32
Ubisecure
Рет қаралды 55 М.
Explain it to Me Like I’m 5: Oauth2 and OpenID
47:50
SpringDeveloper
Рет қаралды 70 М.
OAuth PKCE | OAuth Proof Key for Code Exchange explained
9:39
Jan Goebel
Рет қаралды 41 М.
Security Risk: Single-Page Applications by Andreas Falk
51:21
OAuth 2.0 & OpenID Connect (OIDC): Technical Overview
16:19
VMware End-User Computing
Рет қаралды 154 М.
Why is JWT popular?
5:14
ByteByteGo
Рет қаралды 298 М.
Looks very comfortable. #leddisplay #ledscreen #ledwall #eagerled
0:19
LED Screen Factory-EagerLED
Рет қаралды 7 МЛН
Kumanda İle Bilgisayarı Yönetmek #shorts
0:29
Osman Kabadayı
Рет қаралды 2,2 МЛН
iPhone 16 с инновационным аккумулятором
0:45
ÉЖИ АКСЁНОВ
Рет қаралды 10 МЛН