From the course: Writing Secure Code for Android by Infosec
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Google sign-in
From the course: Writing Secure Code for Android by Infosec
Google sign-in
- Now, what on earth is Google Sign-In? Well, we've talked about it before. Instead of you logging into this website, and that website, and the other website, and you remember all these usernames and passwords, it's a type of single sign on. It's really convenient for the user. The idea is, I go to this website, and one of the options is you can sign into me using your Google account, or your Microsoft account, or your Facebook account, or whatever these big account providers are. And rather than having to know all these usernames and passwords for all these little websites, I shouldn't use the term, little, but for all these other websites, I just need to know Google. Now of course, all of these websites have got to support Google Sign-In, but it's really, really popular, of course. Google Sign-In is a type of OAuth 2.0 authentication system. And OAuth, as we'd mentioned before, is the open authentication. We're version two oh. Users can sign in to participating websites using their…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Authentication, part 111m 34s
-
(Locked)
Authentication, part 211m 3s
-
(Locked)
Activity: Implementing a password checker, part 114m 53s
-
(Locked)
Activity: Implementing a password checker, part 215m 3s
-
(Locked)
Google sign-in5m 50s
-
(Locked)
Activity: Signing in with Google and Facebook7m 48s
-
(Locked)
Keys, tokens, and secrets6m 55s
-
(Locked)
Biometrics9m 30s
-
(Locked)
Activity: Implementing biometrics12m 13s
-
(Locked)
Two-factor authentication12m 5s
-
(Locked)
Authorization, part 111m 48s
-
(Locked)
Authorization, part 25m 40s
-
(Locked)
Authorization, part 35m 40s
-
(Locked)
Activity: Implementing runtime permissions6m 35s
-
(Locked)
Activity: Role-based access control14m 39s
-
(Locked)
OAuth8m 52s
-
(Locked)
Insecure direct object reference5m 37s
-
(Locked)
Session management, part 111m 41s
-
(Locked)
Session management, part 24m 10s
-
(Locked)
Activity: Implementing session management11m 21s
-
(Locked)
-
-