Forem

# oauth

OAuth flow implementation details

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Adding OAuth 2.1 to your MCP server in TypeScript
Cover image for Adding OAuth 2.1 to your MCP server in TypeScript

Adding OAuth 2.1 to your MCP server in TypeScript

6
Comments
5 min read
Protecting Node.js APIs: Audiences, Scopes, and Bearer Tokens
Cover image for Protecting Node.js APIs: Audiences, Scopes, and Bearer Tokens

Protecting Node.js APIs: Audiences, Scopes, and Bearer Tokens

Comments
5 min read
OAuth ate your secrets

OAuth ate your secrets

Comments
7 min read
Microsoft Dropped ACP for UCP in 104 Days. Identity Linking Is Why.
Cover image for Microsoft Dropped ACP for UCP in 104 Days. Identity Linking Is Why.

Microsoft Dropped ACP for UCP in 104 Days. Identity Linking Is Why.

Comments
5 min read
External Client Apps in Salesforce Spring '26: A Practical Migration Guide

External Client Apps in Salesforce Spring '26: A Practical Migration Guide

Comments
7 min read
Vercel got hacked because an employee clicked 'Allow' on an OAuth prompt. We all do this.
Cover image for Vercel got hacked because an employee clicked 'Allow' on an OAuth prompt. We all do this.

Vercel got hacked because an employee clicked 'Allow' on an OAuth prompt. We all do this.

3
Comments
3 min read
Authentication in MERN Apps: JWT, bcrypt, Redis, and OAuth2
Cover image for Authentication in MERN Apps: JWT, bcrypt, Redis, and OAuth2

Authentication in MERN Apps: JWT, bcrypt, Redis, and OAuth2

Comments
10 min read
The Vercel/Context.ai Breach Wasn't a Vulnerability. It Was a Delegation Path.

The Vercel/Context.ai Breach Wasn't a Vulnerability. It Was a Delegation Path.

Comments
7 min read
The Vercel Breach: When Your AI Tool's OAuth Becomes the Attack Vector

The Vercel Breach: When Your AI Tool's OAuth Becomes the Attack Vector

Comments
5 min read
Building Secure APIs for AI Systems: Architecture, Threat Models, and Best Practices
Cover image for Building Secure APIs for AI Systems: Architecture, Threat Models, and Best Practices

Building Secure APIs for AI Systems: Architecture, Threat Models, and Best Practices

1
Comments 1
3 min read
Getting CLI authentication right: the complete guide to all 4 methods
Cover image for Getting CLI authentication right: the complete guide to all 4 methods

Getting CLI authentication right: the complete guide to all 4 methods

Comments
15 min read
My OAuth token expired mid-job. Took 2 hours to figure out why.

My OAuth token expired mid-job. Took 2 hours to figure out why.

Comments
2 min read
Building a Production-Ready OAuth Server for a VS Code Extension — Token Lifecycle, Auto-Refresh & Edge Rate Limiting
Cover image for Building a Production-Ready OAuth Server for a VS Code Extension — Token Lifecycle, Auto-Refresh & Edge Rate Limiting

Building a Production-Ready OAuth Server for a VS Code Extension — Token Lifecycle, Auto-Refresh & Edge Rate Limiting

Comments
9 min read
Building Apps That Act on Behalf of OSC Users (OAuth + PKCE in 50 Lines)
Cover image for Building Apps That Act on Behalf of OSC Users (OAuth + PKCE in 50 Lines)

Building Apps That Act on Behalf of OSC Users (OAuth + PKCE in 50 Lines)

1
Comments
6 min read
Building a Google OAuth CLI in Rust with PKCE (and surviving the borrow checker)

Building a Google OAuth CLI in Rust with PKCE (and surviving the borrow checker)

Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.