
실습으로 배우는 OAuth 2.0 개념 원리, 그리고 해킹과 보안
크리핵티브
OAuth 2.0 프로토콜에 대한 핵심 이론과 실습을 통해 동작 원리를 더욱 자세하게 살펴봅니다. 그리고 해킹과 보안의 관점으로 OAuth 2.0 프로토콜 분석을 해봅니다.
중급이상
모의해킹, OAuth
You may already be familiar with OAuth 2.0, having used it for simple logins with accounts like Google or GitHub. Social login is an extension of OAuth 2.0, and its core technology is in the OAuth 2.0 authorization framework. If you understand the principles of OAuth 2.0, you can develop the ability to implement and adjust it appropriately to your needs.
OAuth2.0
Social Login
Social login has become an essential feature of most online services. It allows users to log in easily, and service providers can easily collect sensitive user information. Furthermore, by offering a variety of login options, it provides users with a wider range of choices.
However, implementing and managing these social login systems requires more than simply following the Kind documentation. Without a solid understanding of the core principles, it's difficult to properly address issues when they arise. Login systems utilizing frameworks like OAuth 2.0, in particular, require an understanding of security vulnerabilities and countermeasures.
OAuth 2.0 Fundamentals: Learn the fundamental principles of the OAuth 2.0 framework and see how these principles are implemented in real-world code through hands-on exercises.
Security Vulnerability Response: Learn hands-on methods for identifying and defending against security vulnerabilities in OAuth 2.0 systems.
Extending Authentication Protocols: Learn how to extend OAuth 2.0 to implement authentication protocols like OpenID Connect. This is becoming increasingly important, especially as demand for outsourced authentication grows.
Easy login feature
Those who need to implement
Developers who want to introduce login functionality via social media accounts into their services.
Simple login has been implemented, but
For those curious about the principle
Those who have already integrated social login functionality into their service but do not have a deep understanding of how it works or the security aspects.
Anyone who wants to learn new skills
Developers who are new to authentication protocols such as OAuth 2.0 or who want to gain a deeper understanding
You will gain a thorough understanding of the basic concepts and principles of OAuth 2.0 and learn how to utilize it in various applications.
You can develop a strategy to defend against security vulnerabilities that may arise during the OAuth 2.0 implementation process.
Extends OAuth 2.0 to enable understanding and implementation of OpenID Connect.
See for yourself how concepts are implemented in code.
The goal is to get a clearer picture by seeing the picture in your head implemented directly in code.
Hello, this is Han Yun-seok.
I love sharing what I've learned with others. It was this desire to share the valuable knowledge I'd gained that led me to create a course and eventually found Codehide.
I also enjoy learning together. I find it more fun to learn by asking each other questions and sharing information, and I feel like it pushes me into a situation where I can't help but continue to grow. That's why I consistently run study groups. Furthermore, I'm constantly thinking about how we can create even better synergy.
I'm working hard today to share what I've learned. I hope that one day, a world will come where developers can work happily without fear.
Q. What is the training environment like?
The practice uses Next.js. I chose Next.js because it allows you to write the client and server as a single project, making it easier.
Q. Is there any prior knowledge required?
Knowledge of JavaScript and React is helpful, but it's not necessary, as the features are simple enough to understand.
Q. How far does OAuth 2.0 cover?
This course covers only the knowledge necessary to create services using OAuth 2.0. Building an authorization server that supports OAuth 2.0 and a resource server are also important topics. However, since it's rare to build one yourself, this course only covers the knowledge necessary to create other services using OAuth 2.0.
Each lecture is intentionally structured into three parts: 1. theory explanation video, 2. lecture material text, and 3. practical training video. Therefore, we strongly recommend studying in the following order.
Understand the general concept by watching the theory video lecture.
As you read the following lecture material text, recall what you learned in the video lecture.
Through hands-on practice, you'll see how the theories you've learned are implemented in code. Pay particular attention to the process of putting the theoretical concepts into practice.
Close the practice session and try typing it out yourself. Instead of just following the video, turn off the video and try it out yourself. If you still can't figure it out, just refer to the video briefly, then close the session again and continue with the practice.
The reason I designed it this way is because video lectures have to keep pace with my speaking speed, and I'm so busy absorbing the content that it's hard to tell if I've understood it correctly. This leads to the illusion of knowing everything.
On the other hand, texts allow readers to read at their own pace, pause for a moment to reflect, and even reread a paragraph or the entire text.
Just following along with the exercises isn't very helpful. You need to be able to think of the code yourself and write it. This won't be easy, but you'll learn a lot more that way. Definitely try this.
Who is this course right for?
Anyone who needs to implement social login functionality
For those who want to learn more about the authentication authorization protocol
Need to know before starting?
JavaScript
network
All
10 lectures ∙ (1hr 15min)
All
10 reviews
4.9
10 reviews
Reviews 5
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
Reviews 2
∙
Average Rating 5.0
Reviews 7
∙
Average Rating 5.0
$17.60
Explore other courses in the same field!