Lukas J Hanblog.lukasjhan.com·Nov 24, 2024Reflections from Internet Identity Workshop 2024: Where Innovation Meets CollaborationA Year of Global Identity Conversations 2024 marked a significant year in my professional journey as I had the privilege of attending both sessions of the Internet Identity Workshop (IIW) in San Francisco - in April and October. These workshops prove...iiw
QuickHop Designsquickhop.uk·Nov 24, 2024Cactus FontDiscover the Beauty of the Cactus Font: Elevating Your Design Projects In the bustling world of design, the right typography can breathe life into any project, and the Cactus font stands out as a vibrant gem in the realm of script fonts. Crafted with...business
karthik hublicustomer-identity-access-management.hashnode.dev·Nov 20, 2024Understanding Customer Identity and Access Management (CIAM)In today's digital world, secure and reliable online interactions are paramount. We entrust our personal information and financial details to countless digital platforms, making robust security measures essential. This is where CIAM, or Customer Iden...IAM
Antoine LOIZEAUblog.smartcloudarchitect.fr·Oct 30, 2024Ajouter des permissions "Mail.Send" de la Graph API à une identité managéeQu’est qu’une Identité managée ? Une identité managée sur Azure (Managed Identity) est un service fourni par Microsoft Azure pour simplifier la gestion des identités dans les applications déployées sur Azure. Une identité managée permet à vos applica...77 readsAzureGraphAPI
Dominic MacAulayprogrammers-mind.hashnode.dev·Oct 11, 2024Identity: The Root of all ChangeI want to become more athletic, slim down, build some muscle, and achieve everything else that comes with being fit. The problem is that every time I try to start going to the gym, I get tired, find other things I’d rather do, and quickly lose motiva...4 likesAtomicHabits
Anand Mauryaanandmaurya.hashnode.dev·Sep 5, 2024Implementing Identity Authentication and Authorization in ASP.NET Core 8 with ScaffoldingIntroduction When building a website, it's important to control who can access certain parts of it. This is where authentication (checking who a user is) and authorization (deciding what they can do) come in. ASP.NET Core 8 makes it easy to handle th...1 like·455 reads.NET MVCBasicC#
ICU Branding agencyicu.hashnode.dev·Aug 22, 2024Global and local contrast in the 3C technique of design evaluation - Part IIKeeping with our developing questions approach, let's test our design options. In the previous section, we examined two Cs: comprehending the context and the caliber of the project's content. Today's topic will be the last C, or (C)contrast, broken d...Design
ICU Branding agencyicu.hashnode.dev·Aug 2, 2024Brand identity: important characteristics and types of visual identityWhat’s the connection between Disney typography, mascots like the Red and Yellow M&Ms, and the turquoise Tiffany box? All of the components of brand identity are there. Quality is no longer seen as a default characteristic and is insufficient for a b...branding
ICU Branding agencyicu.hashnode.dev·Jul 25, 2024Key parts of visual identity and their role in brand strategyIntroduction The idea of "visual identity" is essential to brand planning.There's one for every well-known name. In other words, there isn't a single case of a great brand that doesn't have its look. Apple and its bit Apple are great examples of this...1 likebranding
Mahira Technology Private Limitedmahiratechnology.hashnode.dev·Jul 10, 2024From Zero to Hero: Creating Secure Cognito Identity Pools Using Terraform Without Prior ExperienceIntroduction :- Welcome! If you’re eager to learn how to set up secure Cognito Identity Pools with Terraform but have no idea where to start, you’re in the right place. This document will guide you from knowing nothing about these technologies to set...Cognito