Second implementation example from OAuth2: protocol analysis and implementation, homework report of the course Computer System Security, A.Y. 2019/20
NOTES
- This is only meant for educational purposes, DO NOT DEPLOY IN PRODUCTION ENVIRONMENTS!
- The assets for the single
.jar
builds, the video and thedocker-compose.yaml
are the same as v0.5-alpha.
Changelog
- Added
flow_access-token
andflow_refresh-token
diagrams. - Finished testing phase.
- Bugfix and improvements.