When you are building a new product you need to focus on the areas that offer real differentiation for your business. There is no point in re-inventing the wheel on the commodity functionality that customers take for granted. When it comes to securing the various types of applications you may be wondering what the right approach is. It may seem that with each new architecture, the rules of security get rewritten. JSON Web Tokens, Open ID, Authentication Flows, Oh My!
In this workshop, you'll look at how to demystify common security patterns for various types of modern app architectures. Your trainer, Ado, will go over modern OAuth Flows and how they work, different architecture scenarios, and then in the labs. Next, you'll put theory to practice by applying the concepts we learn by building and securing a real-world application. You'll utilise the Auth0 universal identity platform and show how we can easily implement Sign in with Apple as the example using social connections. We'll also cover best practices both on the frontend and backend to ensure our application is as secure as it can be.