#oauth20 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #oauth20, aggregated by home.social.
-
Разработчики всё ещё путают JWT, JWKS, OAuth2 и OpenID Connect — разбираем на примерах. Часть 2
Мы продолжаем наше погружение в мир аутентификации и будем разбирать всё на простых примерах с практикой на Go. В первой части статьи мы разобрали, как устроен JWT, зачем нам refresh и access токены и почему в распределенных системах нам необходимо использовать асимметричные алгоритмы подписи. Теперь пришло время двигаться дальше и познакомиться с тем, что стоит поверх JWT: JWKS, OAuth 2.0, OIDC.
https://habr.com/ru/companies/ozontech/articles/987012/
#OIDC #sso #oauth2 #oauth20 #go #jwt #access_token #access_токен
-
OAuth 2.0 Security Best Practices: How to Secure OAuth Tokens & Why Use PKCE – Source: securityboulevard.com https://ciso2ciso.com/oauth-2-0-security-best-practices-how-to-secure-oauth-tokens-why-use-pkce-source-securityboulevard-com/ #rssfeedpostgeneratorecho #Authenticationprotocols #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard #Identity&Access #authentication #oauth20 #PKCE
-
[Перевод] Настройка OAuth2/OIDC федерации в OpenAM
В данном руководстве мы настроим федерацию между двумя инстансами OpenAM по протоколу OAuth2/OIDC. Один инстанс будет являться OAuth2/OIDC сервером (Identity Provider), другой - клиентом (Service Provider). Таким образом, вы можете аутентифицироваться в клиентском инстансе OpenAM (SP) используя учетные данные инстанса OpenAM (IdP) по протоколу OAuth2/OIDC.
-
@organicmaps is offering a #bounty to implement #OAuth20 into the app. 💰 Anybody up for it?
#OpenStreetMap #AndroidDev
https://github.com/organicmaps/organicmaps/issues/6144#issuecomment-1921178074 -
@aswath ,
If what I am demonstrating was based solely on #OpenIDConnect + #OAuth20 then we might be close to your characterization, but if you look closer you will see there are other protocol options including #NetIDTLS (labeled as #WebIDTLS), pure #TLS, Digest Authentication etc..
All ultimately providing unambiguous user #identity, post authentication that’s usable for #ABAC based ACL tests —in loosely-coupled fashion.
-
@aswath ,
If what I am demonstrating was based solely on #OpenIDConnect + #OAuth20 then we might be close to your characterization, but if you look closer you will see there are other protocol options including #NetIDTLS (labeled as #WebIDTLS), pure #TLS, Digest Authentication etc..
All ultimately providing unambiguous user #identity, post authentication that’s usable for #ABAC based ACL tests —in loosely-coupled fashion.
-
@aswath ,
If what I am demonstrating was based solely on #OpenIDConnect + #OAuth20 then we might be close to your characterization, but if you look closer you will see there are other protocol options including #NetIDTLS (labeled as #WebIDTLS), pure #TLS, Digest Authentication etc..
All ultimately providing unambiguous user #identity, post authentication that’s usable for #ABAC based ACL tests —in loosely-coupled fashion.
-
@aswath ,
If what I am demonstrating was based solely on #OpenIDConnect + #OAuth20 then we might be close to your characterization, but if you look closer you will see there are other protocol options including #NetIDTLS (labeled as #WebIDTLS), pure #TLS, Digest Authentication etc..
All ultimately providing unambiguous user #identity, post authentication that’s usable for #ABAC based ACL tests —in loosely-coupled fashion.
-
@aswath ,
If what I am demonstrating was based solely on #OpenIDConnect + #OAuth20 then we might be close to your characterization, but if you look closer you will see there are other protocol options including #NetIDTLS (labeled as #WebIDTLS), pure #TLS, Digest Authentication etc..
All ultimately providing unambiguous user #identity, post authentication that’s usable for #ABAC based ACL tests —in loosely-coupled fashion.
-
WebAuthn und FIDO2 sollen Entwicklern das Implementieren passwortfreien Identity- und Access-Managements via SaaS erleichtern.
Hanko Identity will den Abschied vom Passwort -
Das OAuth Server-Modul für Drupal 8 benötigt ein Update auf 8.x-1.1. Die neue Version schließt eine "moderat kritische" Lücke.
CMS Drupal: OAuth Server-Modul anfällig für SQL-Injection-Angriffe