Tagged | auth
-
Biometric authentication - Why do we need it?
(engineering.grab.com)#software-engineering #software-architecture #security #auth
-
Permissions, Privileges, and Scopes
(auth0.com) -
How we implemented an authorization cache for Envoy proxy
(developers.redhat.com) -
Design an authorization cache for Envoy proxy using WebAssembly
(developers.redhat.com) -
How we handle multi-region sessions at Clever
(engineering.clever.com) -
Developers Guide to GPG and YubiKey
(developer.okta.com) -
How We Protect Pinners’ Passwords
(medium.com)#software-engineering #software-architecture #security #auth
-
Slack Details Its New Role Management Architecture
(www.infoq.com) -
Making Leaked Credentials Useless for Attackers
(product.hubspot.com) -
Building Better IAM with a Scale-Out, OLTP Database
(www.cockroachlabs.com) -
Himeji: a scalable centralized system for authorization at Airbnb
(medium.com) -
Introducing The API Security Maturity Model
(nordicapis.com) -
Using your devices as the key to your apps
(blog.cloudflare.com) -
Never Build MFA Again: A Developer's Guide to Transactional MFA
(developer.okta.com) -
Presentation: Secrets at Planet-scale: Engineering the Internal Google KMS
(www.infoq.com) -
Safe ACL Change through Model-based Analysis
(tech.ebayinc.com) -
How Docker Authentication Works: By Documentation, MITM, and Implementation
(levelup.gitconnected.com) -
JWT Architecture for Modern Apps
(levelup.gitconnected.com) -
Salesforce Cloud Security: Automating Least Privilege in AWS IAM with Policy Sentry
(engineering.salesforce.com) -
Biometrics (fingerprint) auth in your web apps
(itnext.io) -
How to Implement a Secure Central Authentication Service in Six Steps
(engineering.shopify.com) -
Securing and centrally monitoring accounts in Amazon Web Services
(www.theguardian.com) -
Presentation: User & Device Identity for Microservices @ Netflix Scale
(www.infoq.com)#software-architecture #scaling #security #microservices #auth
-
Lessons learned from handling JWT on mobile
(tech.just-eat.com) -
eBay Makes Mobile Web Login Easier
(tech.ebayinc.com) -
Push Notifications-based 2-step Verification
(tech.ebayinc.com) -
One Biometric API Over all Android
(android-developers.googleblog.com) -
Server-side rendering: how to serve authenticated content
(stackshare.io) -
How Google adopted BeyondCorp: Part 3 (tiered access)
(security.googleblog.com) -
eBay OAuth Client Library in Python and Best Practices
(tech.ebayinc.com) -
Why Public Key Cryptography Matters
(developer.okta.com) -
Presentation: Securing Services Using SSO
(www.infoq.com) -
A Practical Guide to Building Secure SSO
(engineering.gusto.com) -
Layering authorization into a web application
(engineering.gusto.com) -
Authorization at LinkedIn’s Scale
(engineering.linkedin.com) -
How Twitch Addresses Scalability and Authentication
(blog.twitch.tv) -
What is Identity Infrastructure?
(auth0.com) -
User Migration: The Definitive Guide
(developer.okta.com) -
Anonymous web authentication with Stellar blockchain
(evilmartians.com) -
Keep your infrastructure keys safe with Vault
(blog.octo.com) -
Presentation: Securing Microservices in Hybrid Cloud
(www.infoq.com) -
Everything You Ever Wanted To Know About Authentication at Artsy (But Didn't Know How To Ask)
(artsy.github.io) -
Dweb: Identity for the Decentralized Web with IndieAuth
(hacks.mozilla.org) -
A tour through the OWASP Top 10
(auth0.com) -
Stolen Access Tokens and You
(developer.okta.com) -
8 Vital OAuth Flows and Powers
(nordicapis.com) -
An Overview of Open Standards
(auth0.com) -
Build a Simple API Service with Express and GraphQL
(developer.okta.com) -
On The Nature of OAuth2’s Scopes
(auth0.com) -
Auth0 Architecture: Running In Multiple Cloud Providers And Regions
(highscalability.com) -
An OAuth 2.0 introduction for beginners
(itnext.io) -
Auth0 Architecture: Running In Multiple Cloud Providers And Regions
(auth0.com) -
Netflix Cloud Security: Detecting Credential Compromise in AWS
(medium.com) -
Combining OAuth and JWT to gain performance improvements
(capgemini.github.io) -
Innovating on Authentication Standards
(yahooeng.tumblr.com) -
Stick with security: YubiKey, SSH, GnuPG, macOS
(evilmartians.com) -
Forcing a device to disconnect from WiFi using a deauthentication attack
(hackernoon.com) -
Stepping Towards a Password-Free World
(www.ebayinc.com) -
Active Directory Password Blacklisting
(engineeringblog.yelp.com) -
WebAuthn: A Developer's Guide to What's on the Horizon
(developer.okta.com) -
Secure Access to 100 AWS Accounts
(segment.com) -
What devs need to know about Encoding / Encryption / Hashing / Salting / Stretching
(hackernoon.com) -
The dramatic impersonation : a developer horror tale
(hackernoon.com) -
How Developers got Password Security so Wrong
(blog.cloudflare.com) -
Using Hardware Token-based 2FA with the WebAuthn API
(hacks.mozilla.org) -
How To Structure Permissions In A SaaS App
(heap.engineering) -
Strengthening OAuth2 for Mobile
(hackernoon.com) -
Why Can’t I Just Send JWTs Without OAuth?
(nordicapis.com) -
OAuth 2.0 Best Practices for Native Apps
(auth0.com) -
Effective phone number verification
(android-developers.googleblog.com) -
Interactions in fraud experiments: A case study in multivariable testing
(eng.lyft.com) -
Protect your npm account with 2FA and Authy
(twilioinc.wpengine.com) -
Securing Webtasks Part 1: Shared Secret Authorization
(auth0.com) -
Securing Services for Kubernetes on AWS
(code.hootsuite.com) -
Serverless and Auth0 Webtasks, hop on the bullet train
(auth0.com) -
Stepping Up the Cloud Security Game
(labs.spotify.com) -
Building Account Systems
(auth0.com) -
The Lazy Developer's Guide to Authentication with Vue.js
(developer.okta.com) -
Scaling Event Sourcing for Netflix Downloads, Episode 1
(medium.com) -
How to Not Get Your Identity Stolen
(auth0.com) -
Request Signature Authentication for IVRs Built with Python
(twilioinc.wpengine.com) -
Why JWTs Suck as Session Tokens
(developer.okta.com) -
Identity and Access Management (IAM) in the aftermath of NotPetya
(developer.ibm.com) -
Building a Declarative Permissioning Service
(engineering.remind.com) -
2016 Social, Passwordless and SSO Data: What Can We Learn?
(auth0.com) -
Protecting a Spring Boot App with Apache Shiro
(developer.okta.com) -
Remote device sign-in
(developers.soundcloud.com)