home.social

#authentication — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #authentication, aggregated by home.social.

  1. Alternative to GCPW for Ubuntu: How to link Google Workspace accounts to persistent local users? #gdm #authentication #google #pam

    askubuntu.com/q/1566668/612

  2. Alternative to GCPW for Ubuntu: How to link Google Workspace accounts to persistent local users? #gdm #authentication #google #pam

    askubuntu.com/q/1566668/612

  3. Alternative to GCPW for Ubuntu: How to link Google Workspace accounts to persistent local users? #gdm #authentication #google #pam

    askubuntu.com/q/1566668/612

  4. Alternative to GCPW for Ubuntu: How to link Google Workspace accounts to persistent local users? #gdm #authentication #google #pam

    askubuntu.com/q/1566668/612

  5. Логин через Telegram по-новому: разбираем OIDC-флоу oauth.telegram.org и собираем его на Python

    Telegram теперь полноценный OpenID-провайдер: oauth.telegram.org, JWKS, JWT, claims. Туториалы на GitHub при этом массово показывают старый виджет с HMAC от bot-token и /setdomain в BotFather. Я разобрался с новым флоу и собрал PoC на Python — рассказываю, как устроен обмен между фронтом, Telegram и бэком, чем Login library через telegram-login.js отличается от manual OIDC code flow с PKCE, что настраивать в BotFather (спойлер: не в чате, а в его mini-app), как протестировать локально через ngrok, и какая проверка id_token нужна вместо ручного HMAC.

    habr.com/ru/articles/1033632/

    #telegram #telegram_login #openid_connect #oidc #oauth2 #jwt #jwks #pyjwt #python #authentication

  6. Логин через Telegram по-новому: разбираем OIDC-флоу oauth.telegram.org и собираем его на Python

    Telegram теперь полноценный OpenID-провайдер: oauth.telegram.org, JWKS, JWT, claims. Туториалы на GitHub при этом массово показывают старый виджет с HMAC от bot-token и /setdomain в BotFather. Я разобрался с новым флоу и собрал PoC на Python — рассказываю, как устроен обмен между фронтом, Telegram и бэком, чем Login library через telegram-login.js отличается от manual OIDC code flow с PKCE, что настраивать в BotFather (спойлер: не в чате, а в его mini-app), как протестировать локально через ngrok, и какая проверка id_token нужна вместо ручного HMAC.

    habr.com/ru/articles/1033632/

    #telegram #telegram_login #openid_connect #oidc #oauth2 #jwt #jwks #pyjwt #python #authentication

  7. Логин через Telegram по-новому: разбираем OIDC-флоу oauth.telegram.org и собираем его на Python

    Telegram теперь полноценный OpenID-провайдер: oauth.telegram.org, JWKS, JWT, claims. Туториалы на GitHub при этом массово показывают старый виджет с HMAC от bot-token и /setdomain в BotFather. Я разобрался с новым флоу и собрал PoC на Python — рассказываю, как устроен обмен между фронтом, Telegram и бэком, чем Login library через telegram-login.js отличается от manual OIDC code flow с PKCE, что настраивать в BotFather (спойлер: не в чате, а в его mini-app), как протестировать локально через ngrok, и какая проверка id_token нужна вместо ручного HMAC.

    habr.com/ru/articles/1033632/

    #telegram #telegram_login #openid_connect #oidc #oauth2 #jwt #jwks #pyjwt #python #authentication

  8. Логин через Telegram по-новому: разбираем OIDC-флоу oauth.telegram.org и собираем его на Python

    Telegram теперь полноценный OpenID-провайдер: oauth.telegram.org, JWKS, JWT, claims. Туториалы на GitHub при этом массово показывают старый виджет с HMAC от bot-token и /setdomain в BotFather. Я разобрался с новым флоу и собрал PoC на Python — рассказываю, как устроен обмен между фронтом, Telegram и бэком, чем Login library через telegram-login.js отличается от manual OIDC code flow с PKCE, что настраивать в BotFather (спойлер: не в чате, а в его mini-app), как протестировать локально через ngrok, и какая проверка id_token нужна вместо ручного HMAC.

    habr.com/ru/articles/1033632/

    #telegram #telegram_login #openid_connect #oidc #oauth2 #jwt #jwks #pyjwt #python #authentication

  9. @jtb : an increasing number of people I know do no longer use desktops (that is, at home). An iPhone and an iPad, or an Android phone (and optionally a Chromebook), suffice for most people.

    Commercial password managers will try to lock you in as a customer, while using open source (such as KeePass compatible) apps leads to other risks (such as stopped maintenance or malicious take over).

    Most people I know even refuse to use password managers because of their complexity - while they enormously underestimate their risks by using one or a few weak passwords written on paper or stored in excel sheets.

    Some of them feel betrayed after being advised to use TOTP 2FA - which is not phishing resistant, effectively *is* a password manager, too often without backups (of the shared secrets) being made, leading to account lockout after losing their phones (or app malfunction). And I'm not even considering privacy invasive and insecure TOTP apps such as Authy.

    Nobody warned them of risks associated with TOTP, as nobody warns them for the risks that come with passkeys. People are, IMO, righfully not interested in the crap the industry is trying to enforce on them.

    @rmondello @brandonbutler

    #Passkeys #AccountLockout #Authentication #TOTP #Authy

  10. @jtb : an increasing number of people I know do no longer use desktops (that is, at home). An iPhone and an iPad, or an Android phone (and optionally a Chromebook), suffice for most people.

    Commercial password managers will try to lock you in as a customer, while using open source (such as KeePass compatible) apps leads to other risks (such as stopped maintenance or malicious take over).

    Most people I know even refuse to use password managers because of their complexity - while they enormously underestimate their risks by using one or a few weak passwords written on paper or stored in excel sheets.

    Some of them feel betrayed after being advised to use TOTP 2FA - which is not phishing resistant, effectively *is* a password manager, too often without backups (of the shared secrets) being made, leading to account lockout after losing their phones (or app malfunction). And I'm not even considering privacy invasive and insecure TOTP apps such as Authy.

    Nobody warned them of risks associated with TOTP, as nobody warns them for the risks that come with passkeys. People are, IMO, righfully not interested in the crap the industry is trying to enforce on them.

    @rmondello @brandonbutler

    #Passkeys #AccountLockout #Authentication #TOTP #Authy

  11. @jtb : an increasing number of people I know do no longer use desktops (that is, at home). An iPhone and an iPad, or an Android phone (and optionally a Chromebook), suffice for most people.

    Commercial password managers will try to lock you in as a customer, while using open source (such as KeePass compatible) apps leads to other risks (such as stopped maintenance or malicious take over).

    Most people I know even refuse to use password managers because of their complexity - while they enormously underestimate their risks by using one or a few weak passwords written on paper or stored in excel sheets.

    Some of them feel betrayed after being advised to use TOTP 2FA - which is not phishing resistant, effectively *is* a password manager, too often without backups (of the shared secrets) being made, leading to account lockout after losing their phones (or app malfunction). And I'm not even considering privacy invasive and insecure TOTP apps such as Authy.

    Nobody warned them of risks associated with TOTP, as nobody warns them for the risks that come with passkeys. People are, IMO, righfully not interested in the crap the industry is trying to enforce on them.

    @rmondello @brandonbutler

    #Passkeys #AccountLockout #Authentication #TOTP #Authy

  12. @jtb : an increasing number of people I know do no longer use desktops (that is, at home). An iPhone and an iPad, or an Android phone (and optionally a Chromebook), suffice for most people.

    Commercial password managers will try to lock you in as a customer, while using open source (such as KeePass compatible) apps leads to other risks (such as stopped maintenance or malicious take over).

    Most people I know even refuse to use password managers because of their complexity - while they enormously underestimate their risks by using one or a few weak passwords written on paper or stored in excel sheets.

    Some of them feel betrayed after being advised to use TOTP 2FA - which is not phishing resistant, effectively *is* a password manager, too often without backups (of the shared secrets) being made, leading to account lockout after losing their phones (or app malfunction). And I'm not even considering privacy invasive and insecure TOTP apps such as Authy.

    Nobody warned them of risks associated with TOTP, as nobody warns them for the risks that come with passkeys. People are, IMO, righfully not interested in the crap the industry is trying to enforce on them.

    @rmondello @brandonbutler

    #Passkeys #AccountLockout #Authentication #TOTP #Authy

  13. 🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
    labs.watchtowr.com/the-interne #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated

  14. 🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
    labs.watchtowr.com/the-interne #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated

  15. 🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
    labs.watchtowr.com/the-interne #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated

  16. 🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
    labs.watchtowr.com/the-interne #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated

  17. 🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
    labs.watchtowr.com/the-interne #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated

  18. Given the amount of online scams, if you ever need to verify that a message truly came from me, feel free to ask for a signed response. My public keys are available here:

    https://sami-lehtinen.net/public-keys

    #identity #proof #authentication #digitalsignature