Elanchezhiyan Pdotnetinsights.hashnode.dev·Dec 11, 2024Accessing Outlook Emails with Exchange Web Services and OAuth 2.0 in C#As organizations increasingly adopt cloud-based email services like Outlook (part of Office 365), developers need efficient ways to access emails programmatically. For automation, reporting, or building custom email clients, Exchange Web Services (EW...DiscussC#
Roshan Shrestharosan-shrestha.com.np·Nov 13, 2024Authentication vs. AuthorizationIntroduction: Authentication and Authorization are two critical terms that form the backbone of security on the internet. Together, they help protect our personal information, prevent unauthorized access, and ensure that only trusted users can access...Discuss·3 likes·59 readsOAuthoauth
Romman Sabbirrommansabbir.com·Nov 2, 2024Secure User Authentication in Android: A Comprehensive Guide [PART 2]User authentication is one of the most critical security aspects of any mobile application. Implementing secure authentication methods ensures that users’ data and accounts are protected from unauthorized access. In this article, we will dive deep in...Discuss·50 readsAndroid : Security, Encryption and Secure PracticesAndroid
Ryan Murzynorian3737.hashnode.dev·Aug 21, 2024My Journey Building an App with OAuth2.0 and Spotify: Lessons LearnedAs a recent graduate from a Software Engineering Bootcamp, I had the opportunity to work on a final project that pushed my skills and knowledge to the limit. The aim of this project was to create an application that connected with Spotify through OAu...DiscussSpotify API
raja manisynackwithraj.hashnode.dev·Aug 14, 2024Learn like a Baby - Important Update to BAV2ROPC downgrade attacks for bypassing MFA - 4History BAV2ROPC stands for 'Basic Authentication Version 2 Resource Owner Password Credential' and is commonly used by old email apps such as iOS Mail. It is often seen in SaaS/email account compromises where accounts have 'legacy authentication' en...Discuss·37 readsCloud Attacks - AzureMFA-Bypass
Yash Shrivastavashy053.hashnode.dev·Aug 13, 2024Understanding OAuth2.0 and OpenID Connect: A Simple Guide with ImplementationIdentity and resource ? Identity and access management (IAM) deals with making sure who can access what. Only the people with proper access with a limited set of permissions can access or alter a user’s data. There are two aspects to this from an app...Discuss·31 readsauthentication
Anish GandhiforNo Code with Anishanishgandhi.com·Jul 27, 2024How to implement OAuth 2 in Bubble?What is OAuth 2? OAuth 2 is a way for apps to get permission to access your information without needing your password. It uses tokens, which are like temporary keys, to give specific access to your data. Imagine a valet key for your car that only all...Discuss·1 like·559 readsBubble APIbubble.io
Shreyas skskshreyas.hashnode.dev·May 29, 2024Understanding PKCE - Part 2 - How Access token and Refresh token are generatedIn the previous section, we got to know how to get the authorization code from Auth endpoint of server by sending client id and code_challenge.Once this is done, our next thing is to use this client id, code and code verifier to generate access token...Discusspkce
Shreyas skskshreyas.hashnode.dev·May 28, 2024Understanding PKCE - Part 1 - Authorization flowOAuth 2.0 OAuth 2.0 is a industry standard authorisation technique used in many applications. PKCE is the extension of OAuth 2.0 which uses code_challenge and code_verifier to get access token in client applications. In native applications, we usuall...Discusspkce
Yogitha Kkakarlayogitha.hashnode.dev·Apr 24, 2024SAML vs OAuth vs OpenIDSAML SAML simplifies the implementation of federated authentication and authorization, which involves multiple service providers across multiple organizations and security domains using a single identity provider. An example of federated identificati...DiscussSAML