DEV Community

# oauth

OAuth flow implementation details

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
RFC 8693 Deep Dive: Token Exchange

RFC 8693 Deep Dive: Token Exchange

Comments
10 min read
How Access and Refresh Tokens Work

How Access and Refresh Tokens Work

1
Comments
3 min read
JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

JWT Algorithm Confusion Attacks: CVE-2026-22817, CVE-2026-27804, and CVE-2026-23552 Fix Guide

1
Comments
6 min read
ChatGPT Can Read Your Corporate Email — And You Probably Already Gave It Permission

ChatGPT Can Read Your Corporate Email — And You Probably Already Gave It Permission

1
Comments
5 min read
Week 6 OAuth2 Conceptual Quiz

Week 6 OAuth2 Conceptual Quiz

1
Comments
10 min read
Building a Secure MCP Server with Cloud Run, Rust, and Gemini CLI

Building a Secure MCP Server with Cloud Run, Rust, and Gemini CLI

Comments
9 min read
ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

ChatGPT in your inbox? Investigating Entra apps that request unexpected permissions

1
Comments
1 min read
Build a Spotify Music Time Machine with Python and OAuth 2.0

Build a Spotify Music Time Machine with Python and OAuth 2.0

Comments
8 min read
Building Google Calendar OAuth for a Desktop App

Building Google Calendar OAuth for a Desktop App

1
Comments
13 min read
Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design

Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design

Comments
4 min read
Two "Medium" Findings That Chain Into Full Infrastructure Compromise

Two "Medium" Findings That Chain Into Full Infrastructure Compromise

Comments
4 min read
OpenID Connect Core 1.0 Deep Dive: Understanding the "Authentication" Layer on top of OAuth 2.0

OpenID Connect Core 1.0 Deep Dive: Understanding the "Authentication" Layer on top of OAuth 2.0

3
Comments
15 min read
Designing an Authentication System: OAuth and SSO

Designing an Authentication System: OAuth and SSO

Comments
8 min read
RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS

RFC 8705 Deep Dive: Turning Access Tokens into "Unstealable Tokens" with mTLS

3
Comments
21 min read
How "Login with Google" Can Be Hacked — OAuth Attacks Explained

How "Login with Google" Can Be Hacked — OAuth Attacks Explained

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.