Похожие видео
array(10) {
[0]=>
object(stdClass)#4746 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "996OiexHze0"
["related_video_title"]=>
string(47) "OAuth 2.0 and OpenID Connect (in plain English)"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(7) "OktaDev"
}
[1]=>
object(stdClass)#4719 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "a2qjrPZz42g"
["related_video_title"]=>
string(57) "Introduction to Auth0 Actions ft. Will Johnson | JS Drops"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(14) "This Dot Media"
}
[2]=>
object(stdClass)#4744 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Vp6kx4Sd_E0"
["related_video_title"]=>
string(68) "What is Single Sign-On Authentication? And...How Does it Work? (SSO)"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(7) "OktaDev"
}
[3]=>
object(stdClass)#4751 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "LQl460dFw74"
["related_video_title"]=>
string(86) "Угроза окружения в «треугольнике смерти»"
["posted_time"]=>
string(21) "4 часа назад"
["channelName"]=>
string(18) "The Breakfast Show"
}
[4]=>
object(stdClass)#4730 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "We8_v_WEwiU"
["related_video_title"]=>
string(52) "Auth for agents: Understanding OAuth for MCP Servers"
["posted_time"]=>
string(25) "3 недели назад"
["channelName"]=>
string(6) "Stytch"
}
[5]=>
object(stdClass)#4748 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "1RHAjkWdC-k"
["related_video_title"]=>
string(46) "Why Auth0 for Authentication and Authorization"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
string(13) "IndiTechCoder"
}
[6]=>
object(stdClass)#4743 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AP_O-Xo0J78"
["related_video_title"]=>
string(45) "Every Level Of Hacking Explained in 8 Minutes"
["posted_time"]=>
string(19) "3 дня назад"
["channelName"]=>
string(15) "Privacy Matters"
}
[7]=>
object(stdClass)#4753 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7HgAN5cEmkk"
["related_video_title"]=>
string(28) "I made the PC I couldn't buy"
["posted_time"]=>
string(24) "19 часов назад"
["channelName"]=>
string(15) "Christian Selig"
}
[8]=>
object(stdClass)#4729 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "gkAvH0SHJaA"
["related_video_title"]=>
string(127) "Большие деньги, большой риск: Как везут ценные грузы через всю Канаду!"
["posted_time"]=>
string(23) "9 часов назад"
["channelName"]=>
string(25) "АЛЕКС Брежнев"
}
[9]=>
object(stdClass)#4747 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "STaUe8fmEIU"
["related_video_title"]=>
string(154) "⚡️2 ЧАСА НАЗАД! русским устроили ДРОНОВЫЙ АД, наступление на Сумы остановлено - НАКИ"
["posted_time"]=>
string(23) "8 часов назад"
["channelName"]=>
string(31) "Телеканал Прямий"
}
}
OAuth 2.0 and OpenID Connect (in plain English)
Introduction to Auth0 Actions ft. Will Johnson | JS Drops
What is Single Sign-On Authentication? And...How Does it Work? (SSO)
Угроза окружения в «треугольнике смерти»
Auth for agents: Understanding OAuth for MCP Servers
Why Auth0 for Authentication and Authorization
Every Level Of Hacking Explained in 8 Minutes
I made the PC I couldn't buy
Большие деньги, большой риск: Как везут ценные грузы через всю Канаду!
⚡️2 ЧАСА НАЗАД! русским устроили ДРОНОВЫЙ АД, наступление на Сумы остановлено - НАКИ