1. The student created a music video for the song "Heads Will Roll" by Yeah Yeah Yeahs, taking inspiration from music videos by Rihanna and Kanye West in its use of bright colors, fast pacing, and bold text. The student also drew from the film "Project X" but aimed to portray teenagers in a more realistic light.
2. In additional products like a digipak and website, the student maintained consistency with the music video by using the same fonts, colors, and Andy Warhol-inspired imagery to create a recognizable brand.
3. Feedback from the target audience confirmed that the chosen song was appropriate and relevant for their tastes in modern pop and dance music genres.
The document discusses the importance of teaching Physical Development, Health and Physical Education (PDHPE) in primary schools. PDHPE benefits students physically, socially, emotionally and academically by promoting physical activity, healthy lifestyles, and positive attitudes. It also supports students' personal growth and development. The conclusion emphasizes that both teachers and parents have important roles in helping children understand PDHPE and making healthy choices.
Kent Muer - Creating Business for Local CompaniesKent Muer
?
Kent Muer is an artistic consultant based in Aspen, Colorado who has helped the local business community in several ways. Through his work, he has created more opportunities for companies to take advantage of the skiing and tourism industries in Aspen. He also volunteers in the community, helping organizations like food banks serve more people. In addition, Muer tutors aspiring artists at local schools to give back to his new community of Aspen.
The circulatory system consists of the heart, blood vessels, and blood. Blood transports oxygen, nutrients, waste, and more throughout the body via arteries, veins, and capillaries. The heart is a muscular organ that pumps blood through this circulatory network. It has four chambers - two upper atria and two lower ventricles. Deoxygenated blood enters the right atrium and ventricle then is pumped to the lungs, and oxygenated blood returns to the left atrium and ventricle to be circulated throughout the body in a continuous cycle.
LinkedIn - Creating your Business & Professional ProfileKieran Desmond
?
The document provides guidance on using LinkedIn to find jobs and boost one's career. It discusses setting up an effective LinkedIn profile by having a professional photo, customized URL, complete headline and summary, and listing titles, skills, recommendations and endorsements. It also addresses searching for and applying to jobs on LinkedIn, staying active by interacting with contacts and posting content, and joining relevant groups. The overall goal is to optimize one's LinkedIn presence to effectively connect, network and improve career opportunities.
Seerwan Salih has over 20 years of experience in logistics management, catering services administration, and teaching English. He held positions as a Logistic Supervisor from 2006-2009, Catering Services Manager from 2011-2013, and has been an English teacher since 2002. Salih has a Bachelor's degree in English Language from Salahaddin University and is fluent in English, Arabic, and Kurdish.
Lee Wai See has over 20 years of experience in construction law, quantity surveying, and dispute resolution. She has been an Advocate & Solicitor of the High Court of Malaya since 2005. Prior to becoming a lawyer, she worked for 9 years as a quantity surveyor. Currently, she runs her own law firm specializing in construction law, arbitration, mediation, and intellectual property law. She has advised and represented many local and international clients on construction disputes and projects.
The document outlines 12 steps for an effective recruitment branding strategy. It involves focusing on key performance indicators, creating an advertising story, designing ads with professional help, optimizing content for different channels, getting team buy-in, adding the company brand's flavor, distributing through a marketing mix, engaging influencers, involving employees, generating experiences, assessing initial outcomes, and evaluating return on investment and employment rates. The overall strategy provides guidance on building an impactful recruitment branding campaign.
Suzhou Ante Cosmetics was established in 2011 with capital of RMB 25 million. It manufactures color cosmetics and has 227 employees. The company aims to produce the highest quality cosmetics with at least 98% customer satisfaction. It has obtained various licenses and certifications. Ante has modern production facilities and equipment for making products like skin care, lipstick, powder, and more. It supplies domestic and international brands and had 2014 revenue of over $5 million.
The document discusses Facebook's API and platform. It describes how Facebook has grown to over 1 billion monthly active users since launching in 2004. The document then explains Facebook's social graph and some key components of their platform, including OAuth authentication, the Graph API, social plugins, and Open Graph. It provides an overview of how developers can build applications that integrate with Facebook and access user data through the Facebook API.
This document summarizes OAuth 2.0 draft 8 specifications, including:
- Four client types: web servers, user-agents, native apps, autonomous clients
- Two endpoints: authorization and token
- Accessing protected resources by sending an access token as a bearer token
- Simplifications from OAuth 1.0 like removing signatures and using bearer tokens
- Some remaining questions around assurance levels and user-centric features
OAuth 2.0 allows clients secure access to user resources stored on another server. It involves 3 players: a client, service provider, and resource server. The client registers with the service provider to get an ID and secret. During authorization, the user is redirected to the service provider to grant the client access. If approved, a code is returned to the client to request an access token from the service provider. The client can then use the token to access protected resources from the resource server on behalf of the user. Facebook Connect uses OAuth 2.0 to allow third-party apps to access a user's Facebook profile and other data through the user's authorization. Developers must set up the login URL, handle the callback to get the
OAuth is a standard protocol for authorization that avoids directly sharing usernames and passwords between applications. It allows applications to request and receive limited access to a user's data without giving out their credentials. The OAuth protocol defines authorization flows for different use cases and allows applications to request different scopes of access. Facebook implements OAuth to allow third-party applications to access user data on Facebook in a secure manner by using access tokens rather than credentials.
The document summarizes identity management standards for sharing content and logging into websites. It discusses Open Exchange (OExchange) and OpenGraph for sharing content across social networks. It then covers login standards including OpenID, OAuth, and OpenID Connect. OpenID is presented as an early decentralized login standard, while OAuth added authorization capabilities. More recently, OpenID Connect combines the two and aims to address issues with the previous standards by making implementation easier and improving the user experience.
1. The document discusses OAuth 2.0 and OpenID Connect for API access control and authorization. It provides a brief history of OAuth and describes the core specification and response types.
2. The core specification defines two response types - code and token. The code response type uses authorization codes to obtain access tokens in a two-step process, while the token response type returns access tokens directly.
3. The document also covers token types, notably the bearer token which transmits no signature or secret and is commonly used for API access. It notes that some providers may not follow the latest OAuth draft specifications strictly.
The document outlines a presentation on OAuth 2.0, an authentication framework that allows selective access to a user's resources without sharing credentials. It discusses the necessity of OAuth for enhancing security, explains key terminologies, and details the OAuth workflow from initiation to access token retrieval. Additionally, it highlights potential security vulnerabilities and exploitation techniques related to OAuth, emphasizing the importance of proper implementation.
The document discusses identity management solutions like OpenID and introduces OpenID Connect as an evolution of OpenID that aims to be easier to implement with a better user experience by building on OAuth 2.0. It outlines some of the failures of OpenID 2.0 like being complex to implement and having a URL-based identifier that provides a bad user experience. It then explains some of the improvements in OAuth 2.0 and OpenID Connect like removing signatures, introducing bearer tokens, and adding scopes to provide more flexibility and control over access.
The document discusses the shortcomings of OpenID, highlighting its low adoption and user experience issues, and cites various criticisms from notable figures in the tech industry. It emphasizes the need for a simpler, more flexible identity management solution, such as OpenID Connect built on OAuth 2.0, to improve the single sign-on experience for users. The presentation also suggests potential improvements from browser vendors to streamline user authentication processes.
The document discusses OAuth 2.0 and its updates. It provides a brief history of OAuth including versions 1.0 and 2.0. It explains the core specification of OAuth 2.0 including authorization servers, resource owners, clients, access tokens, and response types. It also summarizes the token type specification and security considerations for OAuth implementations.
This document discusses security issues with OAuth 2 implementations and provides recommendations. It summarizes two cases where incomplete OAuth 2 implementations led to security compromises: Facebook used the implicit flow, allowing access tokens to be passed in URLs and accessed by any site; foursquare's native app passed access tokens to its backend API, allowing impersonation. The document recommends using OpenID Connect for OAuth SSO to add audience restrictions and protecting against token swapping, and using the OAuth assertion flow to authenticate native apps securely.
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...Brian Campbell
?
This document provides an overview of OAuth 2.0 and how it can be used to securely authorize access to APIs from mobile applications. It begins with an introduction to OAuth and discusses how it addresses issues with directly sharing passwords between applications. The document then outlines the basic OAuth flow, including key concepts like access tokens, authorization codes, and refresh tokens. It provides code snippets demonstrating an example OAuth flow for both Android and iOS, showing the HTTP requests and responses at each step.
The document discusses OAuth, a protocol used for authorization, highlighting two versions: OAuth 1, which is complex and involves multiple steps, and OAuth 2, which simplifies the process and emphasizes trust with fewer steps. It outlines various types of authorization grants available in OAuth 2, such as authorization code, implicit, resource owner credentials, and client credentials, and explains how to choose the appropriate grant type based on application needs. Additionally, it mentions the importance of HTTPS in securing OAuth transactions and provides resources for further reading.
Privacy Codes of Practice for the Social Web: The Analysis of Existing Privac...guest1dfa6b0
?
The document analyzes existing privacy codes and the emerging social-centric privacy risks associated with social media platforms. It discusses key aspects such as transparency, consent, user participation, data quality, and security, highlighting the differences in privacy frameworks between traditional web services and social networks. The conclusion emphasizes the need for future privacy codes to address new risks and changing responsibilities in data handling.
Hands-on with OAuth, Facebook and the Force.com PlatformPat Patterson
?
The document outlines a presentation on OAuth 2.0, social sign-on with Facebook, and the Force.com platform, delivered by Pat Patterson from Salesforce. It includes details on the agenda, key aspects of OAuth 2.0, the Facebook Graph API, and instructions for configuring authentication providers and creating social applications. The document also emphasizes forward-looking statements regarding Salesforce's service development and risks associated with their business model.
LinkedIn - Creating your Business & Professional ProfileKieran Desmond
?
The document provides guidance on using LinkedIn to find jobs and boost one's career. It discusses setting up an effective LinkedIn profile by having a professional photo, customized URL, complete headline and summary, and listing titles, skills, recommendations and endorsements. It also addresses searching for and applying to jobs on LinkedIn, staying active by interacting with contacts and posting content, and joining relevant groups. The overall goal is to optimize one's LinkedIn presence to effectively connect, network and improve career opportunities.
Seerwan Salih has over 20 years of experience in logistics management, catering services administration, and teaching English. He held positions as a Logistic Supervisor from 2006-2009, Catering Services Manager from 2011-2013, and has been an English teacher since 2002. Salih has a Bachelor's degree in English Language from Salahaddin University and is fluent in English, Arabic, and Kurdish.
Lee Wai See has over 20 years of experience in construction law, quantity surveying, and dispute resolution. She has been an Advocate & Solicitor of the High Court of Malaya since 2005. Prior to becoming a lawyer, she worked for 9 years as a quantity surveyor. Currently, she runs her own law firm specializing in construction law, arbitration, mediation, and intellectual property law. She has advised and represented many local and international clients on construction disputes and projects.
The document outlines 12 steps for an effective recruitment branding strategy. It involves focusing on key performance indicators, creating an advertising story, designing ads with professional help, optimizing content for different channels, getting team buy-in, adding the company brand's flavor, distributing through a marketing mix, engaging influencers, involving employees, generating experiences, assessing initial outcomes, and evaluating return on investment and employment rates. The overall strategy provides guidance on building an impactful recruitment branding campaign.
Suzhou Ante Cosmetics was established in 2011 with capital of RMB 25 million. It manufactures color cosmetics and has 227 employees. The company aims to produce the highest quality cosmetics with at least 98% customer satisfaction. It has obtained various licenses and certifications. Ante has modern production facilities and equipment for making products like skin care, lipstick, powder, and more. It supplies domestic and international brands and had 2014 revenue of over $5 million.
The document discusses Facebook's API and platform. It describes how Facebook has grown to over 1 billion monthly active users since launching in 2004. The document then explains Facebook's social graph and some key components of their platform, including OAuth authentication, the Graph API, social plugins, and Open Graph. It provides an overview of how developers can build applications that integrate with Facebook and access user data through the Facebook API.
This document summarizes OAuth 2.0 draft 8 specifications, including:
- Four client types: web servers, user-agents, native apps, autonomous clients
- Two endpoints: authorization and token
- Accessing protected resources by sending an access token as a bearer token
- Simplifications from OAuth 1.0 like removing signatures and using bearer tokens
- Some remaining questions around assurance levels and user-centric features
OAuth 2.0 allows clients secure access to user resources stored on another server. It involves 3 players: a client, service provider, and resource server. The client registers with the service provider to get an ID and secret. During authorization, the user is redirected to the service provider to grant the client access. If approved, a code is returned to the client to request an access token from the service provider. The client can then use the token to access protected resources from the resource server on behalf of the user. Facebook Connect uses OAuth 2.0 to allow third-party apps to access a user's Facebook profile and other data through the user's authorization. Developers must set up the login URL, handle the callback to get the
OAuth is a standard protocol for authorization that avoids directly sharing usernames and passwords between applications. It allows applications to request and receive limited access to a user's data without giving out their credentials. The OAuth protocol defines authorization flows for different use cases and allows applications to request different scopes of access. Facebook implements OAuth to allow third-party applications to access user data on Facebook in a secure manner by using access tokens rather than credentials.
The document summarizes identity management standards for sharing content and logging into websites. It discusses Open Exchange (OExchange) and OpenGraph for sharing content across social networks. It then covers login standards including OpenID, OAuth, and OpenID Connect. OpenID is presented as an early decentralized login standard, while OAuth added authorization capabilities. More recently, OpenID Connect combines the two and aims to address issues with the previous standards by making implementation easier and improving the user experience.
1. The document discusses OAuth 2.0 and OpenID Connect for API access control and authorization. It provides a brief history of OAuth and describes the core specification and response types.
2. The core specification defines two response types - code and token. The code response type uses authorization codes to obtain access tokens in a two-step process, while the token response type returns access tokens directly.
3. The document also covers token types, notably the bearer token which transmits no signature or secret and is commonly used for API access. It notes that some providers may not follow the latest OAuth draft specifications strictly.
The document outlines a presentation on OAuth 2.0, an authentication framework that allows selective access to a user's resources without sharing credentials. It discusses the necessity of OAuth for enhancing security, explains key terminologies, and details the OAuth workflow from initiation to access token retrieval. Additionally, it highlights potential security vulnerabilities and exploitation techniques related to OAuth, emphasizing the importance of proper implementation.
The document discusses identity management solutions like OpenID and introduces OpenID Connect as an evolution of OpenID that aims to be easier to implement with a better user experience by building on OAuth 2.0. It outlines some of the failures of OpenID 2.0 like being complex to implement and having a URL-based identifier that provides a bad user experience. It then explains some of the improvements in OAuth 2.0 and OpenID Connect like removing signatures, introducing bearer tokens, and adding scopes to provide more flexibility and control over access.
The document discusses the shortcomings of OpenID, highlighting its low adoption and user experience issues, and cites various criticisms from notable figures in the tech industry. It emphasizes the need for a simpler, more flexible identity management solution, such as OpenID Connect built on OAuth 2.0, to improve the single sign-on experience for users. The presentation also suggests potential improvements from browser vendors to streamline user authentication processes.
The document discusses OAuth 2.0 and its updates. It provides a brief history of OAuth including versions 1.0 and 2.0. It explains the core specification of OAuth 2.0 including authorization servers, resource owners, clients, access tokens, and response types. It also summarizes the token type specification and security considerations for OAuth implementations.
This document discusses security issues with OAuth 2 implementations and provides recommendations. It summarizes two cases where incomplete OAuth 2 implementations led to security compromises: Facebook used the implicit flow, allowing access tokens to be passed in URLs and accessed by any site; foursquare's native app passed access tokens to its backend API, allowing impersonation. The document recommends using OpenID Connect for OAuth SSO to add audience restrictions and protecting against token swapping, and using the OAuth assertion flow to authenticate native apps securely.
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...Brian Campbell
?
This document provides an overview of OAuth 2.0 and how it can be used to securely authorize access to APIs from mobile applications. It begins with an introduction to OAuth and discusses how it addresses issues with directly sharing passwords between applications. The document then outlines the basic OAuth flow, including key concepts like access tokens, authorization codes, and refresh tokens. It provides code snippets demonstrating an example OAuth flow for both Android and iOS, showing the HTTP requests and responses at each step.
The document discusses OAuth, a protocol used for authorization, highlighting two versions: OAuth 1, which is complex and involves multiple steps, and OAuth 2, which simplifies the process and emphasizes trust with fewer steps. It outlines various types of authorization grants available in OAuth 2, such as authorization code, implicit, resource owner credentials, and client credentials, and explains how to choose the appropriate grant type based on application needs. Additionally, it mentions the importance of HTTPS in securing OAuth transactions and provides resources for further reading.
Privacy Codes of Practice for the Social Web: The Analysis of Existing Privac...guest1dfa6b0
?
The document analyzes existing privacy codes and the emerging social-centric privacy risks associated with social media platforms. It discusses key aspects such as transparency, consent, user participation, data quality, and security, highlighting the differences in privacy frameworks between traditional web services and social networks. The conclusion emphasizes the need for future privacy codes to address new risks and changing responsibilities in data handling.
Hands-on with OAuth, Facebook and the Force.com PlatformPat Patterson
?
The document outlines a presentation on OAuth 2.0, social sign-on with Facebook, and the Force.com platform, delivered by Pat Patterson from Salesforce. It includes details on the agenda, key aspects of OAuth 2.0, the Facebook Graph API, and instructions for configuring authentication providers and creating social applications. The document also emphasizes forward-looking statements regarding Salesforce's service development and risks associated with their business model.
1. The document discusses Facebook Login and the Open Graph protocol. It explains how to implement Facebook Login on a website by adding a Facebook app, obtaining app credentials, redirecting users to Facebook for login, and exchanging tokens to obtain long-lived access tokens.
2. It also covers how the Open Graph protocol allows websites to provide metadata so that content shared to Facebook is enriched with things like images, titles, and descriptions from the page.
3. The document provides code examples and links to Facebook developer documentation for implementing Facebook Login and integrating with the Open Graph.
This document discusses web development trends and social media. It provides an overview of the evolution of the web from Web 1.0 to Web 2.0. Examples of government 2.0 initiatives are described. OpenID is introduced as a method for centralized authentication on the web. Benefits and extensions of OpenID are outlined, as well as how it enables single sign-on for web apps.
Navigating OAuth and OIDC: From Access Tokens to SSOMaysam Mousa
?
The document provides an overview of OAuth and OpenID Connect, focusing on how they enable users to grant applications limited access to their accounts without sharing passwords. It details the access token flow, the importance of scopes for limiting access, and the process of user consent. Additionally, it discusses various OAuth roles, client registration, grant types, and the implications of user authentication in applications such as a social media game called Happy Farm.
The document discusses OAuth, an open protocol that allows secure authorization for API access from applications in a simple and standard way. It describes how OAuth works by having a user authorize a client application to access their resources stored on a resource server, such as personal details, without having to share their password. The document also mentions how OAuth is being used by various web services and within higher education for single sign-on and authorization for both internal and external applications.
The document discusses API access control mechanisms such as OAuth and OpenID Connect, detailing their token mechanics and authorization protocols. It explains various OAuth grant types, the structure and use of JSON Web Tokens (JWT), and the differences between OAuth and OpenID Connect in terms of federated identity and user authentication. Additionally, it covers token management lifecycle, implications of using SSO in API management, and strategies for monitoring and revoking tokens effectively.
This presentation outlines how SAP S/4HANA integrates with eCommerce platforms to create seamless digital experiences and enable intelligent enterprise operations.
This presentation explores the integration of SAP S/4HANA, a leading ERP system, with ChatGPT, a powerful generative AI, to drive efficiency and intelligence in business processes.
Internet & Protocols : A Blueprint of the Internet Systemcpnabil59
?
Internet & Protocols: A Blueprint of the Internet System by Nabil Bin Billal is a comprehensive and ambitious guide that unravels the complexity of how the internet works—layer by layer, protocol by protocol, and service by service. This book is designed not just for students or developers, but for anyone curious about the inner structure and functionality of the digital world we depend on every day. Whether you're a beginner hoping to build foundational knowledge or a curious reader aiming to explore deeper layers of internet architecture, this book serves as a solid blueprint.
From the basics of the internet and its protocols to the intricate systems behind servers, databases, hosting, and DNS, the book journeys through every major layer of online connectivity. It explores technologies like TCP/IP, HTTP, DNS, and modern URL systems, helping readers understand how a simple web address leads to a complex interaction between multiple systems and services. With examples from real-life websites such as Apple.com, GitHub Pages, and Bidibo.xyz, concepts are explained clearly and practically.
The book delves into backend processes, covering JavaScript-based interactivity, database integration, and dynamic routing. It then transitions into the world of domains and internet governance, introducing readers to ICANN, registrars, DNS root servers, and the fascinating history of domain name systems. It sheds light on the control structure of the internet, discussing why most digital infrastructure is based in the U.S. and how domain registration has evolved from a free service to a billion-dollar industry.
Security plays a central role in the discussion, with detailed chapters on HTTPS, SSL/TLS, browser verification, and data encryption. It also takes a practical look at performance, introducing concepts like caching, CDNs, and load balancing to show how the modern web achieves speed and stability. The deep and dark web chapters provide insight into the vast unexplored parts of the internet, discussing how anonymity tools like Tor work and what lies beyond the surface web.
A standout feature of the book is its treatment of search engines—both traditional and dark web variants—explaining crawling, indexing, noindex tags, ranking algorithms, and SEO basics. It demystifies how websites appear in Google search results and how metadata plays a key role. Readers are also introduced to the real-time internet, with chapters on IoT, cloud computing, NASA’s deep space networks, Wi-Fi, Bluetooth, Ethernet, and data transmission protocols. Detailed discussions cover IEEE standards, spectrum ranges, SIM card technology, mobile towers, and the very mechanics of electromagnetic communication.
3 years of Quarkus in production, what have we learned - Devoxx PolenJago de Vreede
?
Quarkus has grown in popularity in the last years, but what’s it really like to use it in large-scale, real-world business projects? In this session, we’ll move beyond the basics of "Hello World" to explore how to build enterprise-level applications with Quarkus efficiently.
In this talk we will set up a multi-module project, incorporating integration tests and addressing the challenges with build times, while maintaining a high development velocity. Next, we’ll tackle an upgrade scenario and splitting the application into multiple microservices. Along the way, we’ll share hard-earned lessons, including what to avoid.
At the end of the talk, you should have a good understanding of how to efficiently set up a “big” enterprise project with Quarkus and the confidence to get started.
Fast Reroute in SR-MPLS, presented at bdNOG 19APNIC
?
Md Abdullah Al Naser, Learning Content Developer at APNIC, presented on Fast Reroute (FRR) mechanisms within SR-MPLS at bdNOG 19 held in Dhaka, Bangladesh from 21 to 24 May 2025.
DDos Mitigation Strategie, presented at bdNOG 19APNIC
?
Awal Haolader, Network Analyst / Technical Trainer at APNIC, presented on 'DDoS Mitigation Strategies' at bdNOG 19 held in Dhaka, Bangladesh from 21 to 24 May 2025.
Common Pitfalls in Magento to Shopify Migration and How to Avoid Them.pdfCartCoders
?
Planning to migrate from Magento to Shopify? CartCoders offers reliable and error-free Magento to Shopify migration services, ensuring your store data, design, and SEO remain intact. Get expert migration with zero data loss and minimal downtime.
Top Mobile App Development Trends Shaping the FutureChicMic Studios
?
Our Flutter App Development Services deliver high-performance, cross-platform apps with a single codebase. We build visually stunning, responsive apps that run seamlessly on both iOS and Android.
鉴于此,定制威斯康星大学绿湾分校学位证书提升履历【q薇1954292140】原版高仿威斯康星大学绿湾分校毕业证(UWGB毕业证书)可先看成品样本【q薇1954292140】帮您解决在美国威斯康星大学绿湾分校未毕业难题,美国毕业证购买,美国文凭购买,【q微1954292140】美国文凭购买,美国文凭定制,美国文凭补办。专业在线定制美国大学文凭,定做美国本科文凭,【q微1954292140】复制美国University of Wisconsin-Green Bay completion letter。在线快速补办美国本科毕业证、硕士文凭证书,购买美国学位证、威斯康星大学绿湾分校Offer,美国大学文凭在线购买。
如果您处于以下几种情况:
◇在校期间,因各种原因未能顺利毕业……拿不到官方毕业证
◇面对父母的压力,希望尽快拿到;
◇不清楚认证流程以及材料该如何准备;
◇回国时间很长,忘记办理;
◇回国马上就要找工作,办给用人单位看;
◇企事业单位必须要求办理的
◇需要报考公务员、购买免税车、落转户口
◇申请留学生创业基金
【复刻一套威斯康星大学绿湾分校毕业证成绩单信封等材料最强攻略,Buy University of Wisconsin-Green Bay Transcripts】
购买日韩成绩单、英国大学成绩单、美国大学成绩单、澳洲大学成绩单、加拿大大学成绩单(q微1954292140)新加坡大学成绩单、新西兰大学成绩单、爱尔兰成绩单、西班牙成绩单、德国成绩单。成绩单的意义主要体现在证明学习能力、评估学术背景、展示综合素质、提高录取率,以及是作为留信认证申请材料的一部分。
威斯康星大学绿湾分校成绩单能够体现您的的学习能力,包括威斯康星大学绿湾分校课程成绩、专业能力、研究能力。(q微1954292140)具体来说,成绩报告单通常包含学生的学习技能与习惯、各科成绩以及老师评语等部分,因此,成绩单不仅是学生学术能力的证明,也是评估学生是否适合某个教育项目的重要依据!
1. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
淺談Facebook & OAuth與Live實作
鄧維岱
Danny Deng
2014.05.14
@ 成?大電機系92225
1
Social Web Design Workshop #1
2. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ABOUT ME
? 鄧維岱 Danny
2
3. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ABOUT ME
? 鄧維岱 Danny
? NCKU EE104
2
4. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ABOUT ME
? 鄧維岱 Danny
? NCKU EE104
? MOVEMENT @ SWD 2013
? www.movement-itw.com
2
5. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ABOUT ME
? 鄧維岱 Danny
? NCKU EE104
? MOVEMENT @ SWD 2013
? www.movement-itw.com
2
6. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ABOUT ME
? 鄧維岱 Danny
? NCKU EE104
? MOVEMENT @ SWD 2013
? www.movement-itw.com
2
7. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
What is OAuth?
3
8. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
What is OAuth?
3
Open Standard for Authorization
9. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
授權程式從_____存取資料
4
10. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
授權程式從_____存取資料
4
Website.APP
11. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
授權程式從_____存取資料
4
Website.APP
FB.GitHub.
LinkedIn
12. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
授權程式從_____存取資料
4
Website.APP
FB.GitHub.
LinkedIn
Name.Birth.
Email.Photo
13. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
Why OAuth?
5
14. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
We do not need to sign up new accounts
Why OAuth?
5
15. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
6
So,
16. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
How OAuth works?
6
So,
17. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
7
18. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
7
授權程式從_____存取資料
19. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
? Resource Owner: 使?用者
7
授權程式從_____存取資料
20. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
? Resource Owner: 使?用者
? Resource Server: 存放使?用者資料的伺服器
7
授權程式從_____存取資料
21. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
? Resource Owner: 使?用者
? Resource Server: 存放使?用者資料的伺服器
? Authorization Server: 授權Access Token的伺服器
7
授權程式從_____存取資料
22. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
? Resource Owner: 使?用者
? Resource Server: 存放使?用者資料的伺服器
? Authorization Server: 授權Access Token的伺服器
? Client: Third-Party程式、APP
7
授權程式從_____存取資料
23. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
CLIENT
8
24. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
CLIENT
8
Client ID
25. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
CLIENT
8
Client ID Client Secret
26. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
CLIENT
8
Client ID Client Secret
Redirect URI
27. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
? Scope: 存取資料範圍
9
more reference for scope
28. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
? Scope: 存取資料範圍
9
Public Pro?le (Default).email…
more reference for scope
29. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
? Scope: 存取資料範圍
9
Public Pro?le (Default).email…
more reference for scope
30. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
? Scope: 存取資料範圍
? State: (RECOMMEND) Random, prevent CSRF
9
Public Pro?le (Default).email…
more reference for scope
31. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
? Scope: 存取資料範圍
? State: (RECOMMEND) Random, prevent CSRF
? Code: Get Access Token
9
Public Pro?le (Default).email…
more reference for scope
32. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
? Scope: 存取資料範圍
? State: (RECOMMEND) Random, prevent CSRF
? Code: Get Access Token
? Access Token: Main KEY
9
Public Pro?le (Default).email…
more reference for scope
33. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
OAuth Flow
10
34. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
ROLE
? Resource Owner: 使?用者
? Resource Server: 存放使?用者資料的伺服器
? Authorization Server: 授權Access Token的伺服器
? Client: Third-Party程式、APP
11
授權程式從_____存取資料
35. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
12
36. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
12
37. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
12
Client ID, Redirect URI,Scope, State…
38. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
12
Client ID, Redirect URI,Scope, State…
Agree?
39. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
12
Client ID, Redirect URI,Scope, State…
Agree?
Grant code
Error msg
With same state
40. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
13
41. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
13
Send to Redirect URI
Grant code
Error msg
with same state
42. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
13
Send to Redirect URI
Grant code
Error msg
with same state
CHECK state
43. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
13
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
44. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
13
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
CHECK
1.Client info
2.Redirect URI
45. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
13
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
Access Token
CHECK
1.Client info
2.Redirect URI
46. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
14
Access Token
47. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
14
Access Token
Call Graph API (FB)
48. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
14
Access Token
Call Graph API (FB)
GET User’s info
49. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
14
Access Token
Call Graph API (FB)
Login Success
GET User’s info
50. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT(a little bit detail)
15
51. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT(a little bit detail)
15
Authorization Server Client
52. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT(a little bit detail)
15
Authorization Server Client
Authorization Endpoint
Token Endpoint
53. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT(a little bit detail)
15
Authorization Server
Redirection Endpoint
Client
Authorization Endpoint
Token Endpoint
54. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT
16
Authorization Server
Redirection Endpoint
Client
Authorization Endpoint
Token Endpoint
55. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
17
Client ID, Redirect URI,Scope, State…
Agree?
Grant code
Error msg
With same state
56. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
17
Client ID, Redirect URI,Scope, State…
Agree?
Grant code
Error msg
With same state
57. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
17
Client ID, Redirect URI,Scope, State…
Agree?
Grant code
Error msg
With same state
58. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
https://www.facebook.com/dialog/oauth?
client_id=580500188730688?
&redirect_uri=http://merry.ee.ncku.edu.tw/redirect?
&state=d41d8cd98f00b204e9800998ecf8427e?
&response_type=code?
&scope=email
18
向Authorization Endpoint提出請求
data which redirect back is code
59. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
19
60. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
DENY OR ERROR
http://your_redirect_uri??
error=error?
&error_code=error_code?
&error_description=description?
&error_reason=error_reason?
&state=state
19
more reference for error
61. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
DENY OR ERROR
http://your_redirect_uri??
error=error?
&error_code=error_code?
&error_description=description?
&error_reason=error_reason?
&state=state
19
more reference for error
http://your_redirect_uri??
code=code?
&state=state
AGREE
62. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
20
Client ID, Redirect URI,Scope, State…
Agree?
Grant code
Error msg
With same state
63. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
20
Client ID, Redirect URI,Scope, State…
Agree?
Grant code
Error msg
With same state
64. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT
21
Authorization Server
Redirection Endpoint
Client
Authorization Endpoint
Token Endpoint
65. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
22
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
Access Token
CHECK
1.Client info
2.Redirect URI
66. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
22
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
Access Token
CHECK
1.Client info
2.Redirect URI
67. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
3 PROTOCOL ENDPOINT
23
Authorization Server
Redirection Endpoint
Client
Authorization Endpoint
Token Endpoint
68. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
24
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
Access Token
CHECK
1.Client info
2.Redirect URI
69. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
24
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
Access Token
CHECK
1.Client info
2.Redirect URI
70. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
24
Send to Redirect URI
Grant code
Error msg
with same state
Client info, Grant code
CHECK state
Access Token
CHECK
1.Client info
2.Redirect URI
71. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
https://graph.facebook.com/oauth/access_token?
client_id=client_id ?
&client_secret=client_secret?
&redirect_uri=redirect_uri?
&code=code
25
向Token Endpoint提出請求
Afterwards, get access_token
72. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
26
Access Token
Call Graph API (FB)
Login Success
GET User’s info
73. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
26
Access Token
Call Graph API (FB)
Login Success
GET User’s info
74. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
https://graph.facebook.com/me?
access_token=access_token
27
Graph API request access_token
We will get info depending on scope
75. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
So far, Question?
28
76. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
Live Coding
29
Facebook SDK for JavaScript?
77. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
30
Download Materials
78. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
Let’s start !
31
79. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
Create Facebook App
32
80. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
PHP
33
81. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
STRUCTURE
PHP Folder
? index.html
? jquery-2.0.2.min.js
? facebook.php
? facebook.png
34
82. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
CURL DETAIL
? curl_setopt(ch, option, value);
? CURLOPT_URL: 設定擷取網址
? CURLOPT_RETURNTRANSFER: 回傳是否字串
? curl_exec($ch): 執?行
? curl_close($ch): 關閉
35
83. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
NodeJS
36
If we have time…
84. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
NodeJS
36
With Express and Passport
If we have time…
85. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
STEP
npm install express-generator (Installed by Prof.)
1. ssh username@merry.ee.ncku.edu.tw
2. express XXX (XXX is a folder)
3. cd XXX & npm install
4. npm install passport
5. npm install passport-facebook
37
86. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
STRUCTURE
NodeJS Folder
? app.js
? routes/index.js
? html/facebook.html
38
87. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
MORE REFERENCE
? Passport Authentication for Node.js Applications
? Easy Node Authentication: Facebook
? Notice: Express3.0. We have installed express 4.0
39
88. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
Is OAuth safe?
40
89. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
I do not think so…
Is OAuth safe?
40
90. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
41
Any Question?
91. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
42
Thanks for your listening!
a55660988@gmail.com
92. 2014. By Deng Wei-Dai. For Social Web Design Workshop.
MORE REFERENCE
? (Ruby)簡單易懂的 OAuth 2.0 - 如何?用 OAuth 2 鎖住
你的 API
? OAuth 和 OpenID 到底是什麼呢?
? Spec: The OAuth 2.0 Authorization Framework
43