963 shaares
7 results
tagged
oauth
Si OAuth2 reste un concept flou pour vous ou que vous voulez tout simplement être sûr d’avoir compris ses rouages, cet article devrait vous intéresser.
Flask-OAuthlib is designed as a replacement for Flask-OAuth. It depends on the oauthlib module. The client part of Flask-OAuthlib shares the same API as Flask-OAuth, which is pretty and simple.
The yubikey is a small device that act as a token generator for authentication system. Yubico build them and, as they're seen as a Universal Keyboard, they can be easily interfaced with any kind of system.
From generating OATH token, to One Time Password systems, going by Radius and OpenVPN server authentication, they can be used for a lot of funny things and, among other thing, it's free software (not free hardware, alas). The token is at $25 and you can order them by huge quantities.
Simply put, it's a good token for it's price and, given my threat model (my computer being stolen) it is enough.
From generating OATH token, to One Time Password systems, going by Radius and OpenVPN server authentication, they can be used for a lot of funny things and, among other thing, it's free software (not free hardware, alas). The token is at $25 and you can order them by huge quantities.
Simply put, it's a good token for it's price and, given my threat model (my computer being stolen) it is enough.
Flask-OAuth is an extension to Flask that allows you to interact with remote OAuth enabled applications. Currently it only implements the consumer interface so you cannot expose your own API with OAuth.
Flak-OAuth depends on the python-oauth2 module.
Flak-OAuth depends on the python-oauth2 module.
We don't need a new version of OAuth 2. The current version provides sufficient options for developers to implement most types of applications. Many services such as Facebook, Github, and Google have already deployed OAuth 2 servers, and deployed implementations win. The OAuth 2 spec itself leaves many decisions up to the implementor. Instead of describing all possible decisions that need to be made to successfully implement OAuth 2, this post makes decisions that are appropriate for most implementations.
This post is an attempt to describe OAuth 2 in a simplified format to help developers and service providers implement the protocol.
This post is an attempt to describe OAuth 2 in a simplified format to help developers and service providers implement the protocol.