Table of Contents
- OAuth 2.0 foundations
- Implementing Your Own OAuth 2.0 Provider
- Using an API protected with OAuth 2.0
- Working with OAuth 2.0 profiles
- Self contained tokens with JWT
- OpenID Connect for authentication
- Implementing Mobile Clients
- Avoiding common vulnerabilities

