Ayomide Israelinsightsecurity.hashnode.dev·Sep 13, 2023Understanding the Difference Between Role and Group in IAMIdentity and Access Management (IAM) systems are pivotal in securely managing user access to organizational resources and services. Roles and groups are essential IAM concepts that help streamline access control and permissions. They share the common...Discussidentity-management
DevOps Bridgedevopsbridge.hashnode.dev·Sep 6, 2023Demystifying DevOps Identity Management: A Comprehensive GuideIn today's fast-paced and interconnected digital landscape, DevOps has emerged as a crucial methodology for streamlining software development and IT operations. DevOps, short for Development and Operations, represents a cultural and technical shift t...DiscussDevops
Stella Mariesmkou.hashnode.dev·Aug 29, 2023Pierre's Sweet and Savory TreatsGithub repo: PierresSweetSavoryTreatsReadme includes instructions for setting up the database using migrations Refer Week12.Solutions for practice projects in preparation for Code Review Project Overview Language: C#Framework: ASP.NET MVCDatabase: My...DiscussC#
Derek Onwudiwetecheffect.hashnode.dev·Aug 10, 2023The Digital Identity DoubleIn the sprawling metropolis of Obiagu, where technology seamlessly interweaved with daily life, Nonso and Chiamaka were leading ordinary lives until an unforeseen digital threat cast a shadow over their existence. Nonso, a talented programmer, and Ch...DiscussDigital Marketing
Armstrong Olusojiarmstrong9.hashnode.dev·Aug 7, 2023How to implement the Luhn Algorithm in JavaScript!The Luhn Algorithm is a formula that verifies the accuracy of identification numbers. Some of its applications include credit cards, social security numbers, and more. The formula The Luhn Algorithm follows the following formula: 1. Starting from the...Discuss·26 readsalgorithms
Dipen JaviaProsecurity.dipen.dev·Jul 2, 2023Hello World!A little bit about me My name is Dipen Javia. I'm an IT consultant specializing in Identity & Access Management (IAM). My expertise lies in working with large organizations as a Security Architect helping them plan, develop and deploy IAM solutions. ...Discuss·37 readsIAM
Scott Spendolinispendolini.blog·Jul 4, 2023IDCS Multi-Factor AuthenticationNow that we have APEX delegating authentication and authorization services to IDCS, let's add another layer of security: multi-factor authentication. Multi-factor authentication - or MFA for short - provides an additional layer of security when signi...Discuss·12 likes·89 readsWho Are You?MFA
Uffa Modeyfafacodes.hashnode.dev·Jul 4, 2023Introduction to Identity Management for Web and Mobile Apps Using AWS Cognito User Sign UpsAWS Cognito is a user authentication and management service that provides a secure way to manage user sign-ups and sign-ins for your web or mobile applications. It simplifies the development process for creating user authentication systems and provid...Discuss·10 likesAWS
Scott Spendolinispendolini.blog·Jul 3, 2023Who Are You?🕵 This article is part of a series called "Who Are You?". View all articles in the series here. You can also download the slides that were presented here. In reality, APEX should not be used to manage users & roles. This should be delegated to an ...Discuss·1 like·137 readsWho Are You?Apex
Eyal KatzforSlauth.io - The IAM Copilot's blogblog.slauth.io·Jun 28, 2023A Step-by-Step Guide to Cloud Identity ManagementCloud Identity Management empowers organizations to strengthen security, streamline operations, and maintain compliance in the ever-evolving cloud landscape. As your company scales, so do your workloads and services connected to your cloud infrastruc...Discuss·136 readsIAM management best practicesCloud