Visualizing PKCE - The Attack
Here's a short scenario to help visualize the attack that sparked the need for PKCE. Gain a deeper understanding of why PKCE is needed by watching this video.
In Identity Standards
What is OAuth?
Basic overview of the industry standard OAuth.
OpenID Connect - Continuing the OAuth 2.0 Fruit Analogy
A brief intro into how OIDC adds on to OAuth 2.0.
OAuth 2.0-How to Securely Get Your Grapes
Quick outline of the OAuth 2.0 flow.
OAuth 2.0: Implicit, Authorization Code, and PKCE
What would some of the OAuth 2.0 flows look like in a real-world scenario? Watch and learn about the implicit, authorization code, and pkce flows and see the evolution, then sign up for a free trial of PingOne at http://ow.ly/8VnY50CqDan!
How FIDO + MFA Thwart Phishing Attacks
Watch this 4-minute demo video to learn how you can defend yourself against phishing attacks with risk-based multi-factor authentication that supports FIDO authenticators.
Postman and Ping Identity Twitch Stream
Relive the Postman and Ping Identity live twitch stream where Joyce and Anthony talk about OAuth 2.0 and PKCE.