Session 4: Server to Server Communication with OAuth

Applications that don't have users directly involved in the transaction are special in OAuth. In this session we discuss how to use OAuth for server applications and what tools there are to secure the usages of these tokens.

  • Server to Server communication
  • Client Credentials Flow
  • Client Authentication Methods: Mutual TLS (MTLS)
  • Client Authentication Methods: JWT Client Assertion
  • Client Authentication Methods: Secret
  • MTLS Sender Constrained Tokens

Related resources


Course Outline

Next steps

Ready to modernize IAM?

Start Today - Build security and improve ease of use to stay ahead of the competition.