Related Nanodegree Program
Introduction to Programming
Earn a Nanodegree program certificate to accelerate your career.
Learn moreImplementing Web Security with OAuth 2.0
Earn a Nanodegree program certificate to accelerate your career.
Learn moreApprox. 2 Weeks
Intermediate
As a Python programmer, leveraging Flask allows you to quickly and easily build your own web applications. But before you share your apps on the Internet you should protect your users' data, ensuring information stored on your site is safe from unwanted manipulation. You could implement web security and permissions on your own, but relying on trusted providers is a faster, safer, and easier way to allow users to login to your application - without having to create and maintain another account, profile, and password.
In this course, you will learn to implement the OAuth 2.0 framework to allow users to securely login to your web applications. You'll be provided a restaurant menu application created in Flask. By the end of this course, you will write the necessary code to implement Google+ Sign-In and Facebook Login in options so users can create restaurant menus that are viewable by everyone but only modifiable by the original creator.
This course was built to expand upon the concepts introduced in Full Stack Foundations, specifically:
Additionally, HTML, JavaScript, AJAX are heavily used in this course. A basic understanding of these technologies is needed to get the most out of these lectures.
If you'd like to refresh your HTML knowledge start with our Intro to HTML and CSS course. You can check out the JavaScript Basics and Intro to AJAX courses to brush up on these topics as well.
See the Technology Requirements for using Udacity.
OAuth 2.0 is a popular framework that allows users to login to your web application by using third party sign ins, from providers they've already created and trust, with the click of a button. And because passwords and sensitive data are never sent, your web application does not have to deal with the complexities of secure password storage and security breaches. Your users can then control the level of access your application has to their data, and change or revoke this access at any point in time.
Instructor
Instructor