Loading...
Please wait a moment
Founded by passionate advocates of learning and innovation, Learni set out to make professional training accessible to everyone, everywhere in the world. Our team works in the largest cities such as Paris, Lyon, Marseille, and internationally, to support talents and organizations in their skills development.
Which format do you prefer?
30 free minutes with a training advisor — no commitment.
Loading available slots...
Discover essential strategies, trends, and best practices for effective GDPR compliance training tailored for organizations preparing for March 2026 enforcement and updates.
Discover how design thinking training programs in March 2026 will equip innovation teams with cutting-edge skills for problem-solving, collaboration, and breakthrough creativity in a rapidly evolving business landscape.
Discover the best warehouse management and logistics training options scheduled for March 2026, focusing on emerging trends like AI automation, sustainability, and supply chain resilience to boost your career.
Artificial Intelligence training in Raleigh in June 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
The Training: Master OAuth2 - Securing Applications and Integrating Modern Authentication training is delivered in-person or remotely (blended-learning, e-learning, virtual classroom, remote in-person). At Learni, a Qualiopi-certified training organization, each program is designed to maximize skills acquisition, regardless of the training mode chosen.
The trainer alternates between demonstrative, interrogative, and active methods (through practical exercises and/or real-world scenarios). This pedagogical approach ensures concrete and directly applicable learning in the workplace.
To ensure the quality of the Training: Master OAuth2 - Securing Applications and Integrating Modern Authentication training, Learni provides the following teaching resources:
For in-house training at a location external to Learni, the client ensures and commits to having all necessary teaching materials (IT equipment, internet connection...) for the proper conduct of the training action in accordance with the prerequisites indicated in the communicated training program.
The assessment of skills acquired during the Training: Master OAuth2 - Securing Applications and Integrating Modern Authentication training is carried out through:
Learni is committed to the accessibility of its professional training programs. All our training programs are accessible to people with disabilities. Our teams are available to adapt teaching methods to your specific needs. Do not hesitate to contact us for any accommodation request.
Learni training programs are available for inter-company and intra-company settings, both in-person and remote. Registration is possible up to 48 business hours before the start of training. Our programs are eligible for OPCO, Pôle emploi, and FNE-Formation funding. Contact us to discuss your training project and funding possibilities.
Recap on application security: evolution of authentication, alternatives to OAuth2. Definitions: resource, client, authorization. Actors (Resource Owner, Client, Resource Server, Authorization Server). Problem and solution provided by OAuth2. Detailed view of OAuth2 flows: Authorization Code, Implicit, Password, Client Credentials. Use of the protocol in various contexts (B2B, B2C, Mobile).
Overview of common providers (Keycloak, Google, Azure, Auth0). Creation and configuration of an OAuth2 application on a provider: redirection, scopes, clients. Step-by-step implementation: integration of OAuth2 in a web application with token exchange. Management of refresh tokens, scopes, and permission systems. Securing REST APIs with OAuth2: middleware and token verification. Code examples in JavaScript (Node.js), Python (Flask, Django), or Java (Spring Security).
Limitations, vulnerabilities, and countermeasures (phishing, code interception, CSRF attacks). Best practices in OAuth2 implementation: proof of possession (PKCE), secure token management, local storage vs. session. Advanced scenarios: microservices, SPA/mobile applications, identity federation. Audit of an OAuth2 implementation, log analysis, and authentication issue diagnosis. Deployment, monitoring, and ongoing security vigilance around OAuth2.
Target audience
Developers, systems engineers, and IT architects wishing to secure web and mobile applications using OAuth2.
Prerequisites
Basic knowledge of web development, HTTP protocols, and API management.
Loading...
Please wait a moment





























