๐ข๐๐๐๐ต ๐ฎ.๐ฌ ๐ถ๐ ๐๐ต๐ฒ ๐ถ๐ป๐ฑ๐๐๐๐ฟ๐-๐๐๐ฎ๐ป๐ฑ๐ฎ๐ฟ๐ฑ ๐ฝ๐ฟ๐ผ๐๐ผ๐ฐ๐ผ๐น ๐ณ๐ผ๐ฟ ๐ฎ๐๐๐ต๐ผ๐ฟ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป, ๐ฒ๐ป๐ฎ๐ฏ๐น๐ถ๐ป๐ด ๐ฎ๐ฝ๐ฝ๐ ๐๐ผ ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐๐๐ฒ๐ฟ ๐ฟ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐ ๐๐ฒ๐ฐ๐๐ฟ๐ฒ๐น๐ ๐๐ถ๐๐ต๐ผ๐๐ ๐๐ต๐ฎ๐ฟ๐ถ๐ป๐ด ๐ฝ๐ฎ๐๐๐๐ผ๐ฟ๐ฑ๐. Itโs what powers โLogin with Google/Facebookโ and similar flows, giving apps limited, consented access to your data.
Goal Implement Security OAuth2 for an application.
What is our point of the consideration?
ยท Resource Owner: User which uses our public client application
ยท Public Client: Public client application
ยท Resource Server: Server which hold protected data
ยท Resources: Protected data
ยท Authorization Server: Server which provides access tokens for security communication
Press enter or click to view image in full size
(1) I want to access my resources
(2) Tell the Authorization Server that you are fine to do this action
(3) (3.1) & (3.2) Hello Authorization Server, please allow the client to access my resources. Here are my credentials to prove my identity and code challenge generated by client application along with client id.
(4) Hey Client, User allowed you to access his resources. Here is AUTHORIZATIN CODE.
(5) Here is my client id, code verifier, AUTHORIZATION CODE. Please, provide me a token.
(6) Here is the toke from Authorization Server
(7) Hey Resource Server, I want to access the user resources. Here is the token from Authorization Server
(8) Resource server validate token on the Authorization Server
(9) Authorization server validate token
(10) Hey Client, your token is validated successfully. Here are the resources you requested.
๐๐ข๐ฅ๐๐ง ๐๐๐ซ๐๐ฃ๐จ๐ฏ๐ขฤ
๐๐จ๐ซ๐ญ๐๐จ๐ฅ๐ข๐จ: https://milan.karajovic.rs
๐ ๐จ๐ฅ๐ฅ๐จ๐ฐ ๐ฆ๐ on ๐๐ข๐ง๐ค๐๐๐๐ง: https://lnkd.in/e3cH854Q

Top comments (0)