Harsha ThirimannaExtended , Organisation and Domain Validation SSL CertificatesExtended Validation (EV) SSL Certificates:2 min read·Feb 19, 2024----
Harsha ThirimannaWSO2 Product Migration -Part 1What would be the software migration7 min read·Oct 14, 2023----
Harsha ThirimannaTime ManagementEffective time management is a critical skill that can help you achieve your goals, reduce stress, and increase productivity. There are…2 min read·Dec 28, 2022----
Harsha ThirimannaCustom module for biometric authentication in FRForgeRock is an identity and access management (IAM) platform that provides a range of authentication options, including biometric…2 min read·Dec 28, 2022----
Harsha ThirimannaKerberos with Azure ADKerberos is a network authentication protocol that enables secure communication over networks. It is often used in enterprise environments…1 min read·Dec 28, 2022----
Harsha ThirimannaAuthenticate Go clientTo authenticate using the OpenID Connect (OIDC) protocol in Go, you can use the golang.org/x/oauth2 package, which provides support for…2 min read·Dec 28, 2022----
Harsha ThirimannaIntegrating CIAM into an organizationCustomer Identity and Access Management (CIAM) is a critical aspect of any organization’s digital strategy, as it allows businesses to…3 min read·Dec 28, 2022----
Harsha ThirimannaJourney of CIAMCustomer Identity and Access Management (CIAM) is a crucial aspect of modern business, as it involves the secure management of customer…3 min read·Dec 28, 2022----
Harsha ThirimannaPursuing a Master’s degree in cybersecurityPursuing a Master’s degree in cybersecurity can be a valuable investment in your education and career. The field of cybersecurity is…2 min read·Dec 28, 2022----
Harsha ThirimannaIdentity and Access Management (IAM) and CybersecurityIdentity and Access Management (IAM) and cybersecurity are two closely related fields that play a critical role in protecting organizations…3 min read·Dec 28, 2022----