The Security Checklist What can go wrong? Securely transporting stuff: HTTPS explained Authentication: I am who I say I am 4.1 Form based authentication 4.2 Basic authentication 4.3 One is not enough, 2 factor, 3 factor, .... 4.4 Why use insecure text messages? Introducing HOTP & TOTP 4.5 Handling password resets Authorization: What am I allowed to do? 5.1 Token based Authorization 5.2 OAuth & OAu

