PinnedMihály VargaSecuring .NET Core Applications with Keycloak: Implementing Client Credentials Flow — Part 1 of 2In this tutorial, we will dive into implementing secure server-to-server authentication using Keycloak with the Client Credentials grant…Jan 281Jan 281
PinnedMihály VargaC# Coding Best PracticesC# is a reliable and time-tested language. However, even the most experienced developers make mistakes from time to time. In order to write…Feb 6, 20236Feb 6, 20236
PinnedMihály VargaBeginner’s guide to create full home network segmentation using DD-WRTThere are many tutorials on the internet on the subject, but none of them were exactly what I wanted to achieve and they didn’t work 100%…Jan 24, 2023Jan 24, 2023
Mihály VargaSecuring .NET Core Applications with Keycloak: Enforcing Scoped Authorization — Part 2 of 2In this second installment of our series, we expand upon the secure authentication framework established in .NET Core applications using…Jan 31Jan 31
Mihály VargaOptimistic Concurrency in Code First Entity Framework CoreIn this article I would like to show how to use the RowVersion approach for optimistic concurrency in case of Code First to database object…May 3, 2022May 3, 2022