Emmanuel Oloyedetechemmy.hashnode.dev·Sep 17, 2023Getting started with OAuth and Understanding how it worksIntroduction ✨ I'm writing this due to an experience I had with implementing OAuth. The first time I implemented it in one of my projects, I got a bit confused. I didn't know it worked because I didn't take the time to read the docs, I just made it w...Discuss·1 likeauthentication
TECHcommunity_SAGtechcommsag.hashnode.dev·Sep 14, 2023How to configure webMethods Integration Server with KeycloakOverview Identity and Access Management applications are becoming increasingly common in the corporate landscape, and are used to provide a set of processes, policies, and tools for defining and managing the roles and access privileges of users withi...DiscusswebMethods
Charles WhiteheadProcharlesw.hashnode.dev·Aug 8, 2023How To: Obtain an OAuth2 Token from Azure REST API using Postman and JavaScript (PowerShell included too!)This guide assumes you already have an App Registration with Client Secret created in Azure AD and that the app has sufficient scope to make requests. Reference The Setup From Postman, create a collection with the following Variables on it. The va...Discuss·28 readsAzure
Zach Toddcircumeo.hashnode.dev·Aug 3, 2023An Opinionated Guide to DRF OAuthIn this tutorial I'll demonstrate an opinionated approach to building social authentication into a Django app using REST Framework. I say opinionated because it avoids using any social auth app, relying only on django.contrib.auth and the standalone ...Discuss·27 readsDjango
Daniel Azubuinedflat.hashnode.dev·Jul 31, 2023Implementing Social Sign-In with Microsoft Using React and Django without LibrariesThis article explores the process of integrating social sign-in with Microsoft accounts into a web application built with React and Django. By leveraging Microsoft's OAuth 2.0 authentication flow, developers can allow users to log in to their applica...Discuss·41 likes·82 readsdjango rest framework
Emmanuel GautierforCerberAuthwww.cerberauth.com·Aug 1, 2023Introduction to KeycloakWhat is Identity and Access Management (IAM)? IAM refers to a framework of policies, processes, technologies, and tools that facilitate the management of identities and their access to various resources. In simple terms, IAM allows to control who has...DiscussGet Started with KeycloakIAM
Matteo CollinaforPlatformatic Blogblog.platformatic.dev·Jul 24, 2023Implementing OAuth2 Login with GitHub and PlatformaticOAuth 2 is a popular protocol for authentication and authorization, allowing users to authorize access to their data without the need to share sensitive passwords and other credentials with third-party applications. While this makes Oauth 2 a great o...Discuss·10 likes·230 readsOAuth2
Aabishkar Wagleaabishkar.hashnode.dev·Jul 18, 2023Authentication Strategies for Modern Web ApplicationsAuthentication and authorization are crucial aspects of modern web applications. Authentication ensures that the user is valid and verifies the user's identity while authorization determines user permission and access level. Authorisation is performe...Discussauthentication
Aditya Chaudhariwww.adityatechinsights.com·Jul 8, 2023Why Should I Care About OAuth 2.0? Understand important components in OAUTH2.0 .You've probably heard of OAuth 2.0, but have you ever wondered why it's become such a big deal and how it solves some of our authentication headaches? let's dive into it together! OAuth 2.0 is someone like a loyal mediator that allows different parti...Discuss·147 readssoftware development concepts OAuth2
Nam Nguyenfor『IT』BASEitbase.tv·Jun 26, 2023Understanding OAuth & OAuth 2.0Introduction In today's interconnected digital landscape, secure access to resources and protected data is crucial. OAuth and OAuth 2.0 have emerged as industry-standard protocols for enabling secure authentication and authorization across various ap...Discuss·73 reads🌐 NETWORKINGOAuth2