BT

New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

Older rss
22:06
Web API Follow 115 Followers

Financial Grade OAuth and OpenID Connect

Posted by Nat Sakimura  on  Sep 16, 2017 Posted by Nat Sakimura Follow 0 Followers  on  Sep 16, 2017

Nat Sakimura discusses using OAuth and OpenID for securing financial transaction services.

43:53
Architecture & Design Follow 619 Followers

Secure Microservices Adoption

Posted by Grygoriy Gonchar  on  Jul 22, 2017 Posted by Grygoriy Gonchar Follow 0 Followers  on  Jul 22, 2017

Grygoriy Gonchar describes the benefits of the microservices architecture for security and how to deal with authentication, keeping track of dependencies and storing lots of credentials.

01:06:25
Cloud Follow 56 Followers

OpenID Connect & OAuth - Demystifying Cloud Identity

Posted by Filip Hanik  on  Dec 10, 2016 1 Posted by Filip Hanik Follow 0 Followers , Sree Tummidi Follow 0 Followers  on  Dec 10, 2016 1

Filip Hanik and Sree Tummidi talk about the OpenID Connect and OAuth 2, sharing their experiences building the CF User Authentication and Account management project, and OpenID Connect implementation.

28:58
Architecture & Design Follow 619 Followers

Are Your Microservices Naked and Afraid?

Posted by Alan Ho  on  Sep 18, 2016 Posted by Alan Ho Follow 0 Followers , Sandeep Murusupalli Follow 0 Followers  on  Sep 18, 2016

Alan Ho and Sandeep Murusupalli discuss the right type of protection (OAuth/Throttling) and monitoring (e.g. bot monitoring) needed to be put in place to properly manage microservices.

40:06
DevOps Follow 235 Followers

Access and Secret Management in Cloud Services

Posted by Ryan Lane  on  Aug 20, 2016 Posted by Ryan Lane Follow 0 Followers  on  Aug 20, 2016

Ryan Lane talks about the concepts and tooling for wrangling identity, access management, and secrets (passwords, ssl certificates, access tokens, etc.) in cloud services.

36:35
Development Follow 146 Followers

Two-Factor Authentication

Posted by Phil Nash  on  Jul 12, 2016 Posted by Phil Nash Follow 0 Followers  on  Jul 12, 2016

Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.

26:32
Web API Follow 115 Followers

Light and Fluffy APIs in the Cloud

Posted by Shiva Narayanaswamy  on  Feb 16, 2016 Posted by Shiva Narayanaswamy Follow 0 Followers  on  Feb 16, 2016

Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.

01:29:39
Architecture & Design Follow 619 Followers

Securing Microservices with Spring Cloud Security

Posted by Will Tran  on  Nov 28, 2015 Posted by Will Tran Follow 0 Followers  on  Nov 28, 2015

Will Tran talks about the authentication and authorization scenarios that one may encounter once he starts building out microservices.

52:52
Culture & Methods Follow 175 Followers

Privacy is Always a Requirement

Posted by Eleanor McHugh  on  Oct 07, 2015 Posted by Eleanor McHugh Follow 0 Followers  on  Oct 07, 2015

Eleanor McHugh shares insights on digital privacy, encouraging others to gather the minimum information possible about their users in order to serve their needs.

40:01
Followers

Federating the AWS CLI with an Identity Provider

Posted by Paul Moreno  on  Sep 27, 2015 1 Posted by Paul Moreno Follow 0 Followers  on  Sep 27, 2015 1

Paul Moreno shows how to federate AWS IAM permissions, roles, and users with a directory service such as LDAP or Active Directory with an Identity Provider.

30:04
Followers

Practical Insights when Designing an API from Scratch

Posted by Paul Glavich  on  Aug 07, 2015 Posted by Paul Glavich Follow 0 Followers  on  Aug 07, 2015

Paul Glavich discusses design decisions to be made when building a new API regarding versioning, hypermedia usage, authentication and other aspects.

01:31:20
Followers

Securing Your Grails App - Beyond Authentication & Authorization

Posted by Colin Harrington  on  Jan 25, 2015 Posted by Colin Harrington Follow 0 Followers  on  Jan 25, 2015

Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT