Yvonna Cook’s Post

View profile for Yvonna Cook, graphic

Cloud IAM Engineer - Okta + AWS Certified | 11+ Years in IT & IT Security | Active Directory, Single-Sign-On, SAML, Multi-Factor Authentication, Identity Governance Administration, PAM, Debugging

𝗗𝗮𝘆 𝟮𝟬 𝗼𝗳 𝗠𝘆 𝟯𝟬-𝗗𝗮𝘆 𝗜𝗔𝗠 𝗖𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗢𝗔𝘂𝘁𝗵 🎄 Today, I want to discuss OAuth 2.0 (Open Authorization), a standard that allows applications to access resources on behalf of users. 𝙆𝙚𝙮 𝙋𝙤𝙞𝙣𝙩 - OAuth 2.0 is focused on authorization, not authentication. It differs from protocols like OpenID Connect (OIDC). One of its primary uses is enabling third-party login integration. This allows users to log into applications using their credentials from providers like Google, Facebook, or Twitter, simplifying the login process and enhancing user experience. OAuth 2.0 uses Access Tokens to grant authorization for resource access. The widely used JSON Web Token (JWT) format may include expiration dates for security. 𝗥𝗼𝗹𝗲𝘀 𝗶𝗻 𝗢𝗔𝘂𝘁𝗵 𝟮.𝟬: • Resource Owner: The user or system that owns the protected resources. • Client: The application needing access to those resources, requiring the appropriate access token. • Authorization Server: Issues access tokens after authenticating and obtaining consent from the resource owner. • Resource Server: Protects user resources and validates access tokens before granting access. #IAM #OAuth #Cybersecurity #AccessControl #DigitalSecurity #30DayChallenge

To view or add a comment, sign in

Explore topics