EP72: OAuth 2.0 Explained With Simple Terms (2024)

This week’s system design refresher:

  • Git Merge vs. Rebase vs. Squash Commit (Youtube video)

  • OAuth 2.0 Explained With Simple Terms

  • Top 4 Forms of Authentication Mechanisms

  • Uber Tech Stack - CI/CD

  • Leadership Styles Around The World

Introducing New Relic Interactive Application Security Testing (IAST)(Sponsored)

EP72: OAuth 2.0 Explained With Simple Terms (1)

New Relic Interactive Application Security Testing (IAST) is now in public preview! Engineers, DevOps, and security teams can now find, fix, and verify high-risk vulnerabilities early and accurately to build more secure applications—and ship code faster.

Get started for free

Git Merge vs. Rebase vs. Squash Commit

Oauth 2.0 Explained With Simple Terms

OAuth 2.0 is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials.

EP72: OAuth 2.0 Explained With Simple Terms (2)

The entities involved in OAuth are the User, the Server, and the Identity Provider (IDP).

What Can an OAuth Token Do?

When you use OAuth, you get an OAuth token that represents your identity and permissions. This token can do a few important things:

Single Sign-On (SSO): With an OAuth token, you can log into multiple services or apps using just one login, making life easier and safer.

Authorization Across Systems: The OAuth token allows you to share your authorization or access rights across various systems, so you don't have to log in separately everywhere.

Accessing User Profile: Apps with an OAuth token can access certain parts of your user profile that you allow, but they won't see everything.

Remember, OAuth 2.0 is all about keeping you and your data safe while making your online experiences seamless and hassle-free across different applications and services.

Over to you: Imagine you have a magical power to grant one wish to OAuth 2.0. What would that be? Maybe your suggestions actually lead to OAuth 3.

Latest articles

If you’re not a paid subscriber, here’s what you missed this month.

  1. Database Indexing Strategies - Part 2

  2. "I Was Under Leveled!" — Avoiding the Tragedy of Making Only $500k a Year

  3. Network Protocols behind Server Push, Online Gaming, and Emails

  4. The Foundation of REST API: HTTP

  5. Database Indexing Strategies

To receive all the full articles and support ByteByteGo, consider subscribing:

Top 4 Forms of Authentication Mechanisms

EP72: OAuth 2.0 Explained With Simple Terms (4)
  1. SSH Keys:
    Cryptographic keys are used to access remote systems and servers securely

  2. OAuth Tokens:
    Tokens that provide limited access to user data on third-party applications

  3. SSL Certificates:
    Digital certificates ensure secure and encrypted communication between servers and clients

  4. Credentials:
    User authentication information is used to verify and grant access to various systems and services

Over to you: How do you manage those security keys? Is it a good idea to put them in a GitHub repository?

Guest post by Govardhana Miriyala Kannaiah.

Uber Tech Stack - CI/CD

Uber is one of the most innovative companies in the engineering field. Let’s take a look at their CI/CD tech stacks.

EP72: OAuth 2.0 Explained With Simple Terms (5)

Note: This post is based on research on Uber engineering blogs. If you spot any inaccuracies, please let us know.

Project planning: JIRA

Backend services: Spring Boot to develop their backend services. And to make things even faster, they've created a nifty configuration system called Flipr that allows for speedy configuration releases.

Code issues: They developed NullAway to tackle NullPointer problems and NEAL to lint the code. Plus, they built Piranha to clean out-dated feature flags.

Repository: They believe in Monorepo. It uses Bazel on a large scale.

Testing: They use SLATE to manage short-lived testing environments and rely on Shadower for load testing by replaying production traffic. They even developed Ballast to ensure a smooth user experience.

Experiment platform: it is based on deep learning and they've generously open-sourced parts of it, like Pyro.

Build: Uber packages their services into containers using uBuild. It's their go-to tool, powered by Buildkite, for all the packaging tasks.

Deploying applications: Netflix Spinnaker. It's their trusted tool for getting things into production smoothly and efficiently.

Monitoring: Uber built their own monitoring systems. They use the uMetric platform, built on Cassandra, to keep things consistent.

Special tooling: Uber relies on Peloton for capacity planning, scheduling, and operations. Crane builds a multi-cloud infrastructure to optimize costs. And with uAct and the OnCall dashboard, they've got event tracing and on-call duty management covered.

Have you ever used any of Uber's tech stack for CI/CD? What are your thoughts on their CI/CD setup?

Leadership Styles Around The World

Different leadership styles can be profoundly influenced by cultural differences. Do you agree with the diagram?

EP72: OAuth 2.0 Explained With Simple Terms (6)

Credit: ‘When cultures collide’ book by Richard D. Lewis

EP72: OAuth 2.0 Explained With Simple Terms (2024)
Top Articles
How to Rank Your Blog Post on Google: 10 Tips for 2024
Apex Legends Bloodhound Guide: Best Tips and Tricks for Playing as Bloodhound
Scheelzien, volwassenen - Alrijne Ziekenhuis
Drury Inn & Suites Bowling Green
DPhil Research - List of thesis titles
O'reilly's Auto Parts Closest To My Location
What Are the Best Cal State Schools? | BestColleges
Ymca Sammamish Class Schedule
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Vaya Timeclock
Botanist Workbench Rs3
Find The Eagle Hunter High To The East
litter - tłumaczenie słowa – słownik angielsko-polski Ling.pl
W303 Tarkov
What Is Njvpdi
Oscar Nominated Brings Winning Profile to the Kentucky Turf Cup
Transfer Credits Uncc
Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
Imagetrend Inc, 20855 Kensington Blvd, Lakeville, MN 55044, US - MapQuest
The Exorcist: Believer (2023) Showtimes
Www Craigslist Milwaukee Wi
Shiftselect Carolinas
Www.craigslist.com Savannah Ga
Bjerrum difference plots - Big Chemical Encyclopedia
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Xfinity Outage Map Fredericksburg Va
Greyson Alexander Thorn
Meijer Deli Trays Brochure
Dexter Gomovies
Leben in Japan – das muss man wissen - Lernen Sie Sprachen online bei italki
R/Orangetheory
Urban Blight Crossword Clue
Lowell Car Accident Lawyer Kiley Law Group
Here’s how you can get a foot detox at home!
Edward Walk In Clinic Plainfield Il
Kelsey Mcewen Photos
拿到绿卡后一亩三分地
Planet Fitness Lebanon Nh
Labyrinth enchantment | PoE Wiki
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Lbl A-Z
Smite Builds Season 9
Expendables 4 Showtimes Near Malco Tupelo Commons Cinema Grill
Trending mods at Kenshi Nexus
Sandra Sancc
Tropical Smoothie Address
Evil Dead Rise - Everything You Need To Know
Craigslist Sarasota Free Stuff
Costco Gas Price Fort Lauderdale
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Palmyra Authentic Mediterranean Cuisine مطعم أبو سمرة
Coldestuknow
Latest Posts
Article information

Author: Lidia Grady

Last Updated:

Views: 6583

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lidia Grady

Birthday: 1992-01-22

Address: Suite 493 356 Dale Fall, New Wanda, RI 52485

Phone: +29914464387516

Job: Customer Engineer

Hobby: Cryptography, Writing, Dowsing, Stand-up comedy, Calligraphy, Web surfing, Ghost hunting

Introduction: My name is Lidia Grady, I am a thankful, fine, glamorous, lucky, lively, pleasant, shiny person who loves writing and wants to share my knowledge and understanding with you.