Quang Phanquangphan.hashnode.dev·Sep 9, 2024Secure .NET Core API with KeyCloak.In my previous blogs which I talked about setup .NET Aspire, we set up a solution consisting of a UI project and a back-end API project. However, the endpoints in the API project did not have any authorization or authentication mechanisms, which is n...Discusskeycloak
Adeniyi Adedotun (nisun-dot)adeniyiadedotun.hashnode.dev·Sep 8, 2024SCIM User Provisioning: Streamlining Identity Management with PythonSCIM User Provisioning: Simplify Identity Management with Python Meta Description: Learn how to implement SCIM user provisioning using Python. Streamline your identity management across Azure AD, Okta, and Google Cloud with step-by-step examples and ...Discuss·1 likeUser Provisioning
Azhar Hussainblog.azharhussain.net·Aug 9, 2024Cloud Security Fundamentals-Protecting Your Data in the CloudAs organizations increasingly migrate their applications and data to the cloud, cloud security has become a top priority. Ensuring that your cloud environment is secure is essential to protecting sensitive information, maintaining compliance, and pre...Discuss·4 likes·132 readsCloud Computing 101cloud security fundamentals
Umesh Panditumeshpandit.hashnode.dev·Aug 4, 2024How to Get Started with Azure Active Directory B2C: A Step-by-Step GuideAs I dive into the world of cloud I’ve come to realize the importance of managing identities and access in a secure and efficient way. Azure Active Directory B2C (Azure AD B2C) helps me do that. In this post, I’ll explain how it works and walk you th...Discuss·1 like·37 readsAzure AD B2C
Md Asif Alammeasifalam.hashnode.dev·Jul 22, 2024Implementing User Registration in ASP.NET Core with IdentityIn this post, we will explore how to implement user registration in an ASP.NET Core application using Identity. The provided code snippet demonstrates a controller that handles user registration, including role assignment. Code Explanation The AuthCo...DiscussAuthenticationAndAuthorizationAspnetcore
Victor Ohachorthekibocs.hashnode.dev·Jul 12, 2024The Identity Conflict.I'm back! Well, you asked, "Haven't you been here the whole time?" No, I really haven't been here until the first week of July. It's a bit too late for a story time, so go to bed. If you're a night owl or a nocturnal being, continue reading my first...Discuss·20 likesselfawareness
John Martechaitechjohn.hashnode.dev·Jul 10, 2024Joel Rennich, VP of Product Strategy at JumpCloud - AITech InterviewJoel, how have the unique challenges faced by small and medium-sized enterprises influenced their adoption of AI in identity management and security practices? So we commission a biannual small to medium-sized enterprise (SME) IT Trends Report that l...DiscussAI Systems
Logto Developer Bloglogto.hashnode.dev·Jul 9, 2024Understand Just-in-Time provisioningBefore we discuss Just-in-Time provisioning, imagine you’re building a SaaS B2B app and want to support membership features, allowing members to easily join your workspace (tenant). What features would you propose? Here’s a checklist for you: Sce...Discussauthentication
Nikunj Vaishnavdevcloudjourney.hashnode.dev·Jul 6, 2024AWS IAM: Manage Identity and Access EasilyHello, tech enthusiasts! Today, we're diving into the world of AWS and exploring one of its fundamental services: AWS Identity and Access Management (IAM). If you're managing AWS resources, securing access with IAM is a must. Let’s break it down step...Discuss·30 readsAWS Cloud2Articles1Week
Caroline Johnsoncarolinejohnsoncj.hashnode.dev·Jun 28, 2024Secure and Simple: The Future of Authentication with Push Notification MFAIntroduction In the ever-evolving digital landscape, ensuring secure and seamless customer authentication is paramount. Traditional password-based authentication has long been the standard but comes with significant security risks. Weak passwords, re...DiscussMFA