Visualizing PKCE - The Attack
Here's a short scenario to help visualize the attack that sparked the need for PKCE. Gain a deeper understanding of why PKCE is needed by watching this video.
In Identity Standards
OAuth Grant Types
This presentation covers grant types - how using OAuth, the client can get an access token. February 2015
OAuth 2.0: Implicit, Authorization Code, and PKCE
What would some of the OAuth 2.0 flows look like in a real-world scenario? Watch and learn about the implicit, authorization code, and pkce flows and see the evolution, then sign up for a free trial of PingOne at http://ow.ly/8VnY50CqDan!
Many businesses use an open standard protocol called SAML to share identities between multiple organizations and applications. SAML enables single sign-on, eliminating most passwords and the risks associated with them. See how it works.
OAuth 2.0-How to Securely Get Your Grapes
Quick outline of the OAuth 2.0 flow.
How FIDO + MFA Thwart Phishing Attacks
Watch this 4-minute demo video to learn how you can defend yourself against phishing attacks with risk-based multi-factor authentication that supports FIDO authenticators.
What is OAuth?
Basic overview of the industry standard OAuth.