Visualizing PKCE - The Attack
Here's a short scenario to help visualize the attack that sparked the need for PKCE. Gain a deeper understanding of why PKCE is needed by watching this video.
In Identity Standards
OAuth 2.0: Implicit, Authorization Code, and PKCE
What would some of the OAuth 2.0 flows look like in a real-world scenario? Watch and learn about the implicit, authorization code, and pkce flows and see the evolution, then sign up for a free trial of PingOne at http://ow.ly/8VnY50CqDan!
How FIDO + MFA Thwart Phishing Attacks
Watch this 4-minute demo video to learn how you can defend yourself against phishing attacks with risk-based multi-factor authentication that supports FIDO authenticators.
OAuth Grant Types
This presentation covers grant types - how using OAuth, the client can get an access token. February 2015
What is OAuth?
Basic overview of the industry standard OAuth.
OAuth 2.0-How to Securely Get Your Grapes
Quick outline of the OAuth 2.0 flow.
Postman and Ping Identity Twitch Stream
Relive the Postman and Ping Identity live twitch stream where Joyce and Anthony talk about OAuth 2.0 and PKCE.