Meet Samir Deshar 👋
List of essential commands while doing rooms and labs in hackthebox and tryhackme. Or who know you may be h……
Different ways on how the curl can be used.
What is kerberos and how is it used in SSO
Learn about how the internet knows where to go and how it does it.
WHat is half proxy and how it works
OAuth is a method for authorization that allows access to third-party applications or services without requiring the sharing of usernames and passwords. How OAuth 2.0 Works? OAuth 2.0 is an authorization protocol designed to provide secure delegated access to resources without exposing user credentials to third-party applications. Key Components: Resource Owner: The user who owns the data or resource. Client: The application requesting access to the user’s resource on behalf of the user (e.g., a web or mobile app). Resource Server: The server hosting the protected resources (e.g., an API). Authorization Server: The server that authenticates the user and issues access tokens. This may be the same as the Resource Server. OAuth Flows (Grant Types): OAuth 2.0 offers different authorization flows based on the type of application and security requirements. ...