DEV Community

# oauth

OAuth flow implementation details

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How Access and Refresh Tokens Work

How Access and Refresh Tokens Work

1
Comments
3 min read
JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

1
Comments
6 min read
RFC 8693 Deep Dive: Token Exchange

RFC 8693 Deep Dive: Token Exchange

1
Comments
10 min read
Week 6 OAuth2 Conceptual Quiz

Week 6 OAuth2 Conceptual Quiz

1
Comments
10 min read
Building a Secure MCP Server with Cloud Run, Rust, and Gemini CLI

Building a Secure MCP Server with Cloud Run, Rust, and Gemini CLI

Comments
9 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
Build a Spotify Music Time Machine with Python and OAuth 2.0

Build a Spotify Music Time Machine with Python and OAuth 2.0

Comments
8 min read
Building Google Calendar OAuth for a Desktop App

Building Google Calendar OAuth for a Desktop App

1
Comments
13 min read
Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design

Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design

Comments
4 min read
Two "Medium" Findings That Chain Into Full Infrastructure Compromise

Two "Medium" Findings That Chain Into Full Infrastructure Compromise

Comments
4 min read
OpenID Connect Core 1.0 Deep Dive: Understanding the "Authentication" Layer on top of OAuth 2.0

OpenID Connect Core 1.0 Deep Dive: Understanding the "Authentication" Layer on top of OAuth 2.0

3
Comments
15 min read
Designing an Authentication System: OAuth and SSO

Designing an Authentication System: OAuth and SSO

Comments
8 min read
RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS

RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS

3
Comments
21 min read
How "Login with Google" Can Be Hacked — OAuth Attacks Explained

How "Login with Google" Can Be Hacked — OAuth Attacks Explained

1
Comments
4 min read
ChatGPT Can Read Your Corporate Email — And You Probably Already Gave It Permission

ChatGPT Can Read Your Corporate Email — And You Probably Already Gave It Permission

2
Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.