Acharouaou-mohamedJWT vs OAuth 2: Understanding Authentication and Authorization with ExamplesIn the world of secure web applications, authentication and authorization are two key pillars. While JSON Web Tokens (JWT) and OAuth 2 are…3d ago
Lucas FernandesSpring Security with OAuth2 and LinkedInSetting up OAuth2 with LinkedIn and Spring SecurityOct 151
InJungletronicsbyJ3Why Choose Keycloak?Understanding the Need for an Identity Provider (IdP) and IAM with OAuth & OpenID Connect #keycloakSeries! — Episode 1Nov 28Nov 28
Martin JurranAuthentificating with OAuth 2.0 to SharePoint Online REST Service in .NET — Guide 🤖In this article, I will share how to authenticate with OAuth 2.0 on Office 365’s SharePoint Online platform. The process includes…Mar 27Mar 27
InTowards DevbyMurat AslanA Senior Engineer’s Guide to Implementing OAuth 2.0 SecurelyImplementing OAuth 2.0 in production applications is as much about understanding the theory as it is about handling real-world challenges…Nov 232Nov 232
Acharouaou-mohamedJWT vs OAuth 2: Understanding Authentication and Authorization with ExamplesIn the world of secure web applications, authentication and authorization are two key pillars. While JSON Web Tokens (JWT) and OAuth 2 are…3d ago
Lucas FernandesSpring Security with OAuth2 and LinkedInSetting up OAuth2 with LinkedIn and Spring SecurityOct 151
InJungletronicsbyJ3Why Choose Keycloak?Understanding the Need for an Identity Provider (IdP) and IAM with OAuth & OpenID Connect #keycloakSeries! — Episode 1Nov 28
Martin JurranAuthentificating with OAuth 2.0 to SharePoint Online REST Service in .NET — Guide 🤖In this article, I will share how to authenticate with OAuth 2.0 on Office 365’s SharePoint Online platform. The process includes…Mar 27
InTowards DevbyMurat AslanA Senior Engineer’s Guide to Implementing OAuth 2.0 SecurelyImplementing OAuth 2.0 in production applications is as much about understanding the theory as it is about handling real-world challenges…Nov 232
Kumar HalderOpenIDConnect implementation in Web Apps in ASP.Net web APIIn our previous chapter, we discussed about OpenID and OAuth, pros and cons, the workflow how it works in simplified term. In this chapter…Mar 112
Inovercast blogbyGenesta SebastienKubernetes — Security — SSO Authentication using OAuth2 Proxy and KeycloakThis article deals with how to easily setup authentication for your applications using OAuth2 Proxy (and Keycloak as OAuth2 provider).Apr 101
IBM PTC SecurityOAuth 2.0 — Security and VulnerabilitiesIn this article, we will look at some of the vulnerabilities associated with OAuth 2.0 technology and how to mitigate the same.Dec 8, 2022