BT
Older rss
01:06:25

OpenID Connect & OAuth - Demystifying Cloud Identity

Posted by Filip Hanik  on  Dec 10, 2016 1 Posted by Filip Hanik Sree Tummidi  on  Dec 10, 2016 1

Filip Hanik and Sree Tummidi talk about the OpenID Connect and OAuth 2, sharing their experiences building the CF User Authentication and Account management project, and OpenID Connect implementation.

28:58

Are Your Microservices Naked and Afraid?

Posted by Alan Ho  on  Sep 18, 2016 Posted by Alan Ho Sandeep Murusupalli  on  Sep 18, 2016

Alan Ho and Sandeep Murusupalli discuss the right type of protection (OAuth/Throttling) and monitoring (e.g. bot monitoring) needed to be put in place to properly manage microservices.

01:29:39

Securing Microservices with Spring Cloud Security

Posted by Will Tran  on  Nov 28, 2015 Posted by Will Tran  on  Nov 28, 2015

Will Tran talks about the authentication and authorization scenarios that one may encounter once he starts building out microservices.

01:31:20

Securing Your Grails App - Beyond Authentication & Authorization

Posted by Colin Harrington  on  Jan 25, 2015 Posted by Colin Harrington  on  Jan 25, 2015

Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats

01:30:45

Security for Microservices with Spring and OAuth2

Posted by Dave Syer  on  Nov 26, 2014 Posted by Dave Syer  on  Nov 26, 2014

David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.

01:18:13

Have You Seen Spring Lately?

Posted by Josh Long  on  Aug 31, 2014 1 Posted by Josh Long  on  Aug 31, 2014 1

Josh Long introduces some of the latest Spring features supporting HATEOAS-compliant and OAuth-secured REST services, NoSQL and Big Data, Websockets, OAuth, open-web security and mobile.

38:54

Securing Clojure Web Apps and Services with Friend

Posted by Chas Emerick  on  Jul 11, 2013 Posted by Chas Emerick  on  Jul 11, 2013

Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.

Hook-up to the Social Networks with OAuth 2.0

Posted by John Davies  on  Aug 31, 2012 1 Posted by John Davies  on  Aug 31, 2012 1

John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.

OAuth - Everything You Want to Know (Hopefully)

Posted by Pratap Chilukuri  on  Aug 17, 2012 1 Posted by Pratap Chilukuri  on  Aug 17, 2012 1

Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.

Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security

Posted by Robert Winch  on  Aug 03, 2012 3 Posted by Robert Winch  on  Aug 03, 2012 3

Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.

Accessing Real-World APIs from Clojure

Posted by Pat Patterson  on  Jul 23, 2012 Posted by Pat Patterson  on  Jul 23, 2012

Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.

Who are You? Who am I? Who is Anybody?

Posted by Paul Downey  on  Mar 01, 2012 3 Posted by Paul Downey  on  Mar 01, 2012 3

Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.

BT