Тёмный
Jan Goebel
Jan Goebel
Jan Goebel
Подписаться
Building real-world, production-ready applications. Opinions are my own.
Portfolio: jangoebel.com
Blog: productioncoder.com
What is a hash function?
6:49
Год назад
OAuth2 Resource Indicators
4:23
2 года назад
What are Bearer Tokens?
3:48
2 года назад
OAuth 2 Dynamic Client Registration
7:00
2 года назад
OAuth Authorization Server Metadata
4:53
2 года назад
Well-known URIs
4:26
2 года назад
OAuth 2 Token Introspection
8:07
2 года назад
OAuth 2.0 Token Revocation
3:19
2 года назад
HMAC vs digital signature
6:28
2 года назад
HTTP Message Signatures explained
25:24
2 года назад
OAuth vs JWTs
3:21
2 года назад
JWS vs JWE
4:34
2 года назад
Should you use HS256 with JWTs?
3:30
2 года назад
JWT RS256
3:47
2 года назад
JWT HS256
2:37
2 года назад
Комментарии
@sigge.g2193
@sigge.g2193 День назад
thanks!
@lolloBriggi
@lolloBriggi 2 дня назад
Why do we moved to this kind of big tech thrid party fucking payed login system? Just keep your user in your database and every time one user log-in it ask for a token (that has an expiration time) than can now be use by the frontend to fetch the fuck it need. All those layer of fake security introduce only more complexity and more layer of possible failure or human error. Keep in mind that we are not running bank (and not even bank use those fucking systems)but 99% of us are running fucking website and note apps. and dont use the fucking PaaS or cloud or fucking shit overpriced that the industry convince coding monkey to use, just use a fucking VPS and if you need use also a CDN. Fuck this programming industry and fucking garbage language and framework like react ecosystem. Just program dont spent your time learning fucking slave instrument and mental masturbation system deseigned as gucci clothing to create a urge of need and run tech buisneeses with the money you give them and train fucking AI with the data you give them. I hate programmers so dumb and they feels so smart with their ununderstandable documentation and their fear to re-write the weel. Frankly said you are a waste of oxygen and mass producer of carbon-dioxide to maintain fucking inefficient and useless systems not to mention that 50% of all apps probably don’t even need to use https over http, wtf an hacker will do with the agar.io information of one user? Ridiculous
@user-rp6vo7ns5j
@user-rp6vo7ns5j 4 дня назад
Excellent explanation, thank you!
@IHHI22
@IHHI22 14 дней назад
on my wordpress website -chrome on my phone says not secure, safari on laptop also says not secure but my SSL certificate is good i checked. also chrome on my laptop doesn't say not secure. I went to inspect >console on website and this error was there but I don't know what it means or where the error is located. The Source Location is blank - "Content Security Policy of your site blocks the use of 'eval' in JavaScript` The Content Security Policy (CSP) prevents the evaluation of arbitrary strings as JavaScript to make it more difficult for an attacker to inject unathorized code on your site. To solve this issue, avoid using eval(), new Function(), setTimeout([string], ...) and setInterval([string], ...) for evaluating strings. If you absolutely must: you can enable string evaluation by adding unsafe-eval as an allowed source in a script-src directive. ⚠ Allowing string evaluation comes at the risk of inline script injection. 1 directive Source location Directive Status script-src blocked
@ecommercetechbuild1354
@ecommercetechbuild1354 15 дней назад
Wonderful explanation
@toufikurrahmantoufik5368
@toufikurrahmantoufik5368 18 дней назад
Thank You so much . I have complete a task. by following for video.
@m.k.bearit
@m.k.bearit 18 дней назад
thanks! well prepared and informative, made my life much easier :)
@nemisis282
@nemisis282 20 дней назад
So if im understanding this correctly, this just prevents loading scripts, from sources not allowed by the CSP. But an attacker could still use an inline script tag to run any javascript they could fit everything they need within the comment box (assuming stored and in a comment input)?
@BB-bo4iy
@BB-bo4iy 26 дней назад
Thank you for explaining it in such detail. I looked for many videos for CORS explanation and yours might be one of the best ones.
@ukaszkiepas57
@ukaszkiepas57 Месяц назад
thank you buddy ! :)
@Mr.D4yz
@Mr.D4yz Месяц назад
Great video! Short and simple explanation to share with colleagues and not look like an alien trying to explain it.
@YummyExtraSteps
@YummyExtraSteps Месяц назад
My hero
@samuelopeyemi8377
@samuelopeyemi8377 Месяц назад
Thank you. Is there a way to add text on a loaded image without first doing it with canvas? Adding text on the image directly with pdfkit
@nhefner
@nhefner Месяц назад
fantastic explanation, thank you!!
@LewisMoten
@LewisMoten Месяц назад
How is this different from hashing passwords with salt? hash('sha256', 'My Password'.$salt)
@sakthinivasan2678
@sakthinivasan2678 Месяц назад
one of the best video,I have seen about oauth 2.0
@barani7821
@barani7821 Месяц назад
Best explanation for PKCE, Thanks so much
@serdar.d
@serdar.d Месяц назад
Thank you for the video, Jan.
@serdar.d
@serdar.d Месяц назад
Just to answer the question in min 12: Yes, a JWE video would be great (if you haven't already done it)
@alexpato4
@alexpato4 Месяц назад
One of the best explanations about OAuth, thanks a lot!
@drstrangebudgie4052
@drstrangebudgie4052 Месяц назад
Great video. I would also mention that the structured token has an expiration date. So if a token is revoked at the auth server but the resource server doesn't introspect, at least the resource server will only accept the token until it expires anyway.
@zmxn007
@zmxn007 Месяц назад
Short but a Beautiful explanation of PKCE with OAuth. Thanks
@kirstinebrrup9656
@kirstinebrrup9656 Месяц назад
Great video.
@mattgraves3709
@mattgraves3709 Месяц назад
Damn clients...just unable to keep things confidential
@jgoebel
@jgoebel Месяц назад
Indeed 😅
@aghiadalzein3069
@aghiadalzein3069 2 месяца назад
Great video ,simple and directly into the point thanks a lot.
@jgoebel
@jgoebel Месяц назад
Glad it was helpful!
@codezard1
@codezard1 2 месяца назад
I have a question, while redirecting at very first time to Athorization server, we pass code challenge and the method with which it is hashed, if anyone steals that information then it can easily decrypt the original Code verifier and next time it can steal the Authorization Code and send the same code verifier string.
@jgoebel
@jgoebel Месяц назад
The code verifier is a randomly generated, high-entropy string that is generated freshly for every OAuth authorization
@user-qt1mz2xe8c
@user-qt1mz2xe8c 2 месяца назад
Perfect video! Only thanks to that I`ve understood why is token introspection sometimes needed with jwt tokens. Thank you very much!
@jgoebel
@jgoebel 2 месяца назад
Glad it helped!
@softMediaWox
@softMediaWox 2 месяца назад
Saved my project. Thanks.
@jgoebel
@jgoebel 2 месяца назад
Glad it helped!
@grltrader
@grltrader 2 месяца назад
Great video!
@jgoebel
@jgoebel 2 месяца назад
Glad you enjoyed it
@alexpascal5403
@alexpascal5403 2 месяца назад
great explanation, it took a while to find one. You put it in a visual way and your explaination skills are like a teacher. ... you deserve a good old massaging of the balls.
@josephchris8629
@josephchris8629 2 месяца назад
I can not be grateful enough. This is my first comment ever on RU-vid. You are indeed a great Teacher!
@jgoebel
@jgoebel 2 месяца назад
thx
@HappyTest-rr3jq
@HappyTest-rr3jq 2 месяца назад
hey i get that oauth2 is required by third party to access api, example when i say continue with google for the first time it will get my email name profile photo and all, this will help in getting those data and creating user but how login happens with "login with google" button.
@georgesmith9178
@georgesmith9178 2 месяца назад
Yes, I noticed times and again that whoever wrote the specification did not really go over them logically and make sure there was no overlap. The explanation here was good. The reality though is staggering as developers who never read the spec "REST-ful", or should I say REST-like code. Of course, I can't blame them - they are constantly assigned 2.5 their possible workload ALL the time. So who has time to read the spec!? The managers just wants them to close the tickets, so the report looks good.
@jgoebel
@jgoebel 2 месяца назад
True, but I found that if you know the theory and the spec, you can get things done way faster and have less stress in the long run
@feugos
@feugos 2 месяца назад
Hi! Is it possible concatenate some custom log in the end of main log for each route?
@andreaskaudel3047
@andreaskaudel3047 2 месяца назад
Great stuff ! Thank you very much !
@jgoebel
@jgoebel 2 месяца назад
Glad you liked it!
@ruocaled
@ruocaled 2 месяца назад
So you're saying it's just for displaying something immediately on the callback UI to reduce API calls? seems pretty pointless unless it's does something else.
@jgoebel
@jgoebel Месяц назад
It tells you who the end user is. OAuth only tells you what the end user can do
@tomatte99
@tomatte99 2 месяца назад
thankssss
@jgoebel
@jgoebel 2 месяца назад
you're welcome
@Voigt_Analytics
@Voigt_Analytics 2 месяца назад
Wenn ich doch nur wüsste, wie man diese blöden Konfigurationsprofile (p12) mit Zertifikat & Key für iOS/iPadOS erstellen könnte. Bei macOS klapppt der Import in die Keychain über das Terminal. Doch wie macht man das bei iOS, wenn man mTLS in Safari zum Login nutzen möchte? Jemand eine Idee? Hab schon verschiedene Ansätze ausprobiert, alle sind gescheitert. 😞
@najaericsson71
@najaericsson71 3 месяца назад
Very good!
@jgoebel
@jgoebel 2 месяца назад
Thanks!
@user-od7yh9xc9o
@user-od7yh9xc9o 3 месяца назад
So well explained , thank you so much and just keep goin'.
@jgoebel
@jgoebel Месяц назад
thx
@srinivas1483
@srinivas1483 3 месяца назад
Message digest algorithms don't use secret keys, where HMAC is a combination of a secret key and a hash function.
@Saurabh12129
@Saurabh12129 3 месяца назад
This makes me believe I am not dumb.
@jgoebel
@jgoebel Месяц назад
Most explanations on the Internet are just overly complicated and don't explain the why
@saravanasai2391
@saravanasai2391 3 месяца назад
Great explanation.
@jgoebel
@jgoebel 3 месяца назад
Glad you liked it
@pierspad
@pierspad 3 месяца назад
Good video but really bad EQ, I had to really crank down 125HZ cut to keep the floor from shaking :/
@jrblackify
@jrblackify 3 месяца назад
Excellent video! Not verbose and tedious like many others, and very informative. The only small nit I have: at 4:45 you say "we will learn about the response type in a minute" but then I don't think you ever talk about it. You do talk about Grant Types which are related (I think?) but not response type.
@nwaformicah433
@nwaformicah433 3 месяца назад
Nice video and I think of using Oauth for the project am working on now but I want to ask a question. Did I need to pay or add my credit card before I can use it?
@jgoebel
@jgoebel 3 месяца назад
OAuth is just a standardized framework and quite a few Identity Providers offer it as a service. Whether or not that is free depends on the provider
@nwaformicah433
@nwaformicah433 3 месяца назад
@@jgoebel Thanks so much I just want to use user email for sign in, him or her into my express server. I have a full stack app, mern
@WildMemo
@WildMemo 3 месяца назад
Explained well! Thank you.
@jgoebel
@jgoebel 3 месяца назад
Glad you liked it
@eli1882
@eli1882 3 месяца назад
You should write a script before hand this comes across as messy and confusing. Maybe make a video covering this topic again.
@hfasihi
@hfasihi 3 месяца назад
Well done. Good explanation
@jgoebel
@jgoebel 3 месяца назад
Glad it was helpful!
@VivekSingh-rr3fr
@VivekSingh-rr3fr 3 месяца назад
Where can we get these beautiful diagrams?