Visualizing the OAuth Flow and Why PKCE is Needed

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

Great Video! Can you please now create a video where you actually demo how PKCE can save me.

souvikghosh
Автор

But they did not explain how PKCE can secure this. (That was the reason I came to this video. The problem was pretty apparent.)

_dinesh
Автор

Fun explanation if need for PKCE (though not the PKCE flow itself explained)

vukkumsp
Автор

imagine when App1 ordered the CODE, he also 'WHISPER' a secret(generated inside App1) to the waitress, and in the next step, exchanging the KEY using the CODE, that secret is required and will be validated on the Auth server. that's loosely what PKCE about.

mj
Автор

one minute does not the code flow requires client secret too. even though the other app got code how was it able to exchange the code without client secret

abhaysoni
Автор

Plz allow captains for this video if possible

phyoewaipaing
Автор

I still don't get it. PKCE seems to say "the OS is compromised, here is a half baked solution". My thoughts are, if the OS is compromised, there are NO SOLUTIONS -ZERO. I just don't get this. It seams like a scam to get me to use corporate products. Anyway, maybe I'm crazy, but I say this is non-sense. I still have no understanding how if the OS is even potentially compromised, how any data can be secure? Thanks for making the video though! Maybe I'm slightly less confused....

johndee
Автор

This video is confusing because it does not explain how HTTPS protects client-server connections from network attacks.

GheorgheUngureanu-ltix
Автор

It describes why does PKCE exist but doesn't really describe how does it work :(

vadimemelin
Автор

You didnt actually demonstrate PKCE hence you got a few thumbs down

victoro
Автор

Just stick to a workflow!!! it is easier. Very complicate understanding

johnfernandes