OAuth User-Managed Access Protocol Overview
What exactly is UMA and why bother? Ever tried to share a private medical record with a specialist or give...
What exactly is UMA and why bother? Ever tried to share a private medical record with a specialist or give...
Authentication is the foundation of application security, yet it's one of the most frequently mishandled aspects of software development. With...
The myth of the standing army and why you are wrong about your audience Ever feel like you are shouting...
The basics of saml 2.0 for enterprise Ever had that moment where you log into a work app and it...
Why traditional ciam fails in distributed systems Ever tried updating a security library across fifty different microservices on a Friday...
The high stakes of isolation in enterprise saas Ever had that sinking feeling where you realize a user might've seen...
The death of the password in b2c software Ever wonder why your users drop off at the login screen? It's...
Understanding programmatic seo and why it matters Ever felt like you're running on a treadmill trying to write enough blog...
Introduction to FreeRadius in a Passwordless World Ever tried explaining to a ceo why the "legacy" radio server is still...
The Identity Landscape for Modern Enterprises Ever tried explaining to a ceo why their login screen broke after a simple...