Best of OAuth โ€” September 2023

  1. 1
    Article
    Avatar of bytebytegoByteByteGoยท3y

    Sessions, Tokens, JWT, SSO, and OAuth in One Diagram

    The article explains the concepts of sessions, tokens, JWT, SSO, and OAuth in one diagram and discusses the impact of web session management on web applications. It also provides information on the most used Linux commands and outlines the aspects of cloud-native adoption. Additionally, it compares the event sourcing system design with the normal CRUD system design.

  2. 2
    Article
    Avatar of infosecwriteupsInfoSec Write-upsยท3y

    OAuth 2.0 Hacking ๐Ÿ’ธ

    OAuth 2.0 Hacking is an open authorization protocol. It allows sharing of resources stored on one site to another site without using their credentials. It uses username and password tokens instead of credentials. The resource owner is the user/entity granting access to their protected resource, such as Twitter account Tweets.