Explore Okta API Access Management

Course 1 of 2 in Secure APIs with Okta API Access Management

If your application is public, your API probably is too!

rate limit

Code not recognized.

About this course

An unprotected public API can be reverse engineered by a malicious user, which can then be misused to gain access to resources they should not be able to access. Explore Okta API Access Management, an implementation of the OAuth 2.0 framework. 

  • Understand the importance of protecting your public APIs.
  • Review the components of the OAuth 2.0 framework.
  • Understand how an OAuth 2.0 authorization flow works.

About this course

An unprotected public API can be reverse engineered by a malicious user, which can then be misused to gain access to resources they should not be able to access. Explore Okta API Access Management, an implementation of the OAuth 2.0 framework. 

  • Understand the importance of protecting your public APIs.
  • Review the components of the OAuth 2.0 framework.
  • Understand how an OAuth 2.0 authorization flow works.