Great to hear your name is Raghav and I am really happy for your contributions, please keep up the good work and do more videos on other useful technologies as well. Thank you so much.
Authentication is often done when requesting the API token, once you have the token, that is tied on with the API request. All that is left at that point is Authorizing. I do like the thought of it making more sense to Authorize a resource and API requests act on resources.
Hi Raghav. Thank you for the video. I have been viewing several of your videos lately and greatly appreciate them. However, I do have an issue with your analogy in this particular video. You said you recognized the person at the door and let them into your home, and that is authentication. I would argue that is two steps. You visually authenticated them, maybe used their voice for authentication as well. But when you let them into your home, that is authorization. Even if you don't let them do anything once inside, it's still authorization, albeit very limited authorization. You could authenticate them and not allow them into your home. Just because you know who they are doesn't mean you have to let them in. You might recognize (authenticate) the neighborhood thief. I doubt that you would let them in your home. 😁 At any rate, thanks for your videos.
Hi Raghav, Thanks for the videos for simple and easy explanation for non technical person. Could you please upload the video for data management in a layman terms.Thank
Hey Raghav, I follow your videos and really like the way you explain things. Simple & Step by step. I would like to know if you have any playlist got apache web server configurations for redirect, load balancer etc Thank you
As suggested by instead of starting with SOAP UI project Im going through the Web Services Tutorial and not it makes sense why you asked to understand the concepts of webservices first....hope after this I will be able to do the SOAP UI project?
Awesome video. When I am validating localhost/hello api getting 401 unauthorized in postman. Could you please help me why I am getting this error though the api was simple hello world get.
Nice explanation sir.i have a question.in api OWASP top ten .we have broken authentication as a second vulnerability in the list.so my question is here we are doing broken authentication or authorisation?little confused.please help me with this.thanks in advance
See we call it Authorization because it gives direct access to the resource. However the credentials are anyways validated. So we do authentication and authorization both
THANK YOU Raghav for taking time and effort to create these videos and sharing your knowledge. Simply love the way you explain things out. Respect! Cant leave without hitting the LIKE button. Request others to do the same if you feel you have benefitted from this, which I am sure you would have. This is the least we can do to encourage them to keep sharing and keep up to date with latest trends in the industry.
Hi, I am getting WordPress error, "Authorization token does not found" I am getting error when I login to WordPress, but website is not affected. Can you help with solution
I disagree. And I know that I'm disagreeing with the entire web here. But all the authorization header is doing is providing a credential that proves who that request is claiming to be that does not authorize the credential holder to do anything, unless after confirming the credential, the endpoint decides that it should be allowed to execute that endpoint. An officer can knock at your door and show their badge which authenticates them as an officer of the law. But that does not authorize them to enter. They have to provide a separate piece of information showing that they are authorized to enter, unless you decide to allow them.
Hi Ben, I understand your thoughts, if you see the video again, I have mentioned that the url (endpoint) is the location of a specific resource and that is why the combination of valid credentials and url makes it Authorization
Nice Raghav ..This is new things for me and I have some problems with how can we contact with you directly because I am a mechanical engineer and I have five years of experience in production now I am left my job and I want to be changed my field mechanical to automation and I have certification also in testing field.but in automation lots of things and I am a little bit confused...so please sir share with me your contact details or email id.
Love your explanation Raghav!! When I am confused of anything, I come to your videos for clarification and I get perfect answers for my doubts
Great to know this
Wonderful. Love the simplicity and clarity in your examples and analogies. And sound of those peacocks in the background is just sweet.
Thank you so much Bharat
I was so confused about the API's before coming here. This is the best resource, the explanation and examples were perfect. Thank you Raghav!
You're very welcome Amitoz
Great to hear your name is Raghav and I am really happy for your contributions, please keep up the good work and do more videos on other useful technologies as well. Thank you so much.
Most welcome Ram
Crystal clear explanation Sir. Thank you so much.
You are welcome Jagadeeshwari
You're a great teacher! Thanks for your videos :)
You're very welcome Karolina
hahhahh the home example is so true, some guests they authorize themselves automatically and check your refrigerator. Thanks Raghav :)
most welcome
Your way of expressing the concept is really awesome and its very clear, all of your videos are so useful ....Thank you very much !!!
You are most welcome Kamakshi
thanks bhai. dil aagaya aapke explanation mein
thanks a lot
Authentication is often done when requesting the API token, once you have the token, that is tied on with the API request.
All that is left at that point is Authorizing.
I do like the thought of it making more sense to Authorize a resource and API requests act on resources.
well said Brandon
Best
Woww.... Very easily explained.. the Mickey an Minnie Stories are awesome Raghav...much interesting and very much helpful..
Glad you liked it
As much as I like this video, I can't help but notice Peacock's scream in the background. Such a natural sounds I must say!
Yes Srivani, very beautiful and kind creatures.
What an explanation sirji👏👏👏👏👏
Thanks Vikas
Very easily explained!! Thanks a lot 🙏🏻
Glad it was helpful Kalpita
Very simple way of understanding.. Thank u soo much sir.
You are most welcome Lifonar
Thank you for explanation Raghav! Very clean and easy.
Glad it was helpful Ganira
Sir I am blessed to have such a good teacher like you, Sir, Thank you for guiding us in our QA journey sir.
It's my pleasure Naman. All the best. Never Stop Learning
@@RaghavPal Thankyou so much for motivating us sir 🙏, I will always follow up your path.
Really compliments clear and perfect
Thanks Giovanni
Impressed with the simplistic way of explanation. 👍
Thanks Prateesh
Thanks for good explanation. God bless you.
You are welcome
thank you for the simple way to explain it. I love the peacock voice comes from background.
You are so welcome Teju
Wonderful explanation sir!
Thanks a lot
Excellent job Raghav !! I love how easy you make it for the rest of us. Thank you !!
Thanks Bobby
Greta, I have this doubt a week ago and is solved now
Happy to know this Isaac
Very good explanation skills and example are really great... it's simple and easy to understand... thank you so much..
Most welcome Saranya
Great explanation. Thanks so much
You're very welcome Sara
Great explanation. Thank You!
Glad it was helpful Zahra
Thank you for taking time and explaining us with really simple examples... this really help me a lot.. Thank you so much again.. 😇😇
Glad it was helpful!
you are awesome, Best explanation ❤️
Thank you! 😃
This is great. Thank You very much! Keep up the good work!
Most welcome
Very well explained. Thanks
You are welcome Abhijit
Simply beautiful
Thank you! Udaya
Very useful information Raghav thanks for the video
Thanks and welcome Mayank
Oh man you are doing a great Job! I don't have words to appreciate your work.
Thank you so much Chaudhry
clear and very bravo !
Thanks a lot
Sir.... u r an excellent teacher... Hats off to you... :)
Thanks Mahadev
finally i got them. Thank you sir
You're welcome
Superb explained👍
Thanks Kishan
Thank you very much! Very clean and easy to understand explanation!
You are welcome Jan
Hi Raghav. Thank you for the video. I have been viewing several of your videos lately and greatly appreciate them. However, I do have an issue with your analogy in this particular video. You said you recognized the person at the door and let them into your home, and that is authentication. I would argue that is two steps. You visually authenticated them, maybe used their voice for authentication as well. But when you let them into your home, that is authorization. Even if you don't let them do anything once inside, it's still authorization, albeit very limited authorization. You could authenticate them and not allow them into your home. Just because you know who they are doesn't mean you have to let them in. You might recognize (authenticate) the neighborhood thief. I doubt that you would let them in your home. 😁 At any rate, thanks for your videos.
Thanks for your views.. I will check on this
The video notes are awesome!! Thank you!!
You're so welcome Krystal
very useful stuff, love the way you explain. keep up the good work.
Thanks
Perfectly explained. Love all of your videos. THX!
You're very welcome!
Nice explanation.
Glad it was helpful!
very nicely explained
Thank you so much Abraham
Awesome explanation
Glad you liked it
No word to say for me, thank you
Most welcome
Thanks once again !!
Could you please tell me one clear difference between SOAP and REST. Or do you have any video on it already? Please point me to it.
Hi Muneet, yes you can check the videos under API section here - automationstepbystep.com/
@@RaghavPal Thanks a lot!! I am following your videos for using Postman!
Awesome 👍
Thanks Rajan
Thanks Raghav ,great little vid ... to understand the concept ... 🙏🏿
Glad it was helpful!
Sir Really your explanation very good to understand and the way of giving exact examples is too good. I want to know more about Rest Assured
Thanks Tejashwini, can check all tutorials here - automationstepbystep.com/
Wonderful! Couldn't have explained better. Thank you for these videos.
You're very welcome Ishwarya
Nice & simple explanation 👍
Thanks for watching Darshan
Hi Raghav, Thanks for the videos for simple and easy explanation for non technical person. Could you please upload the video for data management in a layman terms.Thank
I will try
Thanks for the response....
Thanks Raghav, nice simplified explanation.
Kindly suggest me book for design patterns.
Thanks for watching Yatish. I will have to check online for good
suggestions
Thanks friend, excellent video
Thanks for the visit Marko
Hey Raghav, I follow your videos and really like the way you explain things. Simple & Step by step. I would like to know if you have any playlist got apache web server configurations for redirect, load balancer etc Thank you
Thanks for your kind words Darshan, not as of now, You can find all my work here automationstepbystep.com/
very useful..thanks
You are welcome
really, you are great
thanks a lot
You are most welcome Vikky
As suggested by instead of starting with SOAP UI project Im going through the Web Services Tutorial and not it makes sense why you asked to understand the concepts of webservices first....hope after this I will be able to do the SOAP UI project?
yes, All the best Amer
Thank you so much!
Most welcome
Thank you 😊
You're welcome Suraj
Authentication means validation and authorization means access permissions
thumbs up
Awesome video. When I am validating localhost/hello api getting 401 unauthorized in postman. Could you please help me why I am getting this error though the api was simple hello world get.
it may be due to invalid token, pls check community.postman.com/t/how-to-resolve-error-401-unauthorized/16765/4
Excellent Raghav! You really spoke well..It was at a very good pace!!!
Glad you liked it Indranil
Hi ragav, I have a doubt. Could you please tell me how to link postman with TFS?
Hi Divya, not done, will have to check online
Grt very well explained 👌👌.. do u have same tutorials for Selenium or core java crash course
Hi Deepika, can find here - automationstepbystep.com/
Nice explanation sir.i have a question.in api OWASP top ten .we have broken authentication as a second vulnerability in the list.so my question is here we are doing broken authentication or authorisation?little confused.please help me with this.thanks in advance
See we call it Authorization because it gives direct access to the resource. However the credentials are anyways validated. So we do authentication and authorization both
Hello, Can you start tutorial for test complete tool .... Or if you know where to find tutorial except smart bear one .... Please help ..
I will plan Swati
Thanks!
You're Welcome Olga
Difference between oauth 1 and oauth 2.0 and bearer token
I will take a session on this Vijay
@@RaghavPal thanks Raghav
THANK YOU Raghav for taking time and effort to create these videos and sharing your knowledge. Simply love the way you explain things out. Respect!
Cant leave without hitting the LIKE button.
Request others to do the same if you feel you have benefitted from this, which I am sure you would have. This is the least we can do to encourage them to keep sharing and keep up to date with latest trends in the industry.
This guy simply believes in GIVING, I did not see him even asking for Likes, so down to earth and humble!!
So happy & humbled to see your message Sameer
Hi, I am getting WordPress error, "Authorization token does not found"
I am getting error when I login to WordPress, but website is not affected.
Can you help with solution
Not sure, will need to check online resources
@@RaghavPal Thank you, I got solution
Authentication+Authorization example - Facebook, Gmail
can take that
Sir, what is your charge 159/month when I click on Join ? But still I can access your youtube videos to learn without joining?
Hi Deepika, when you click on JOIN you can see the perks of the channel
Ok
hope it was useful
Sorry to say this raghav, still I have confusion why do we have authorization and not authentication in api requests, can you please explain clearly
Ok Ramanuja, pls check this automationstepbystep.com/2020/04/29/4414/
I disagree. And I know that I'm disagreeing with the entire web here. But all the authorization header is doing is providing a credential that proves who that request is claiming to be that does not authorize the credential holder to do anything, unless after confirming the credential, the endpoint decides that it should be allowed to execute that endpoint.
An officer can knock at your door and show their badge which authenticates them as an officer of the law. But that does not authorize them to enter. They have to provide a separate piece of information showing that they are authorized to enter, unless you decide to allow them.
Hi Ben, I understand your thoughts, if you see the video again, I have mentioned that the url (endpoint) is the location of a specific resource and that is why the combination of valid credentials and url makes it Authorization
I swear I understood it in just 15sec of example but I wonder what others saying for straight 1 hour vid
glad it was helpful
Nice Raghav ..This is new things for me and I have some problems with how can we contact with you directly because I am a mechanical engineer and I have five years of experience in production now I am left my job and I want to be changed my field mechanical to automation and I have certification also in testing field.but in automation lots of things and I am a little bit confused...so please sir share with me your contact details or email id.
Hi Harishankar, you can email at raghav.qna@gmail.com
there is basic auth
yes
Thank you so much!
You're welcome Walter