kauffmann.nl | It’s a recurring question I get quite frequently: how to set up Business Central on-premises for Azure Active Directory authentication? And related to that, how to call APIs on Business Central on-premises with OAuth authentication? I… | microsoft oauth, oauth authentication, time oauth, premise oauth, central oauth | central, api, authentication, dynamic, al | 25 |
kilala.nl | I'm currently going through PDSO's API security training , preparing for the exam. OAuth gets about twenty minutes of video in there and they do a relatively good job of explaining. But yet again, there's still a lot of details missing. | oidc oauth, oauth authorization, dive oauth, oauth technical, oauth opa | exam, api, certification, vendor, objective | 13 |
devnetnoord.nl | …you can enable your autonomous services to also make autonomous authorization decisions. Join me in finding out how OAuth On-Behalf-Of works, and why it's relevant. In this talk, we'll cover why user delegation using On-Behalf-Of helps… | access oauth, oauth developer, decision oauth, oauth behalf | azure, session, package, github, presentation | 4 |
eelcomulder.nl | .Net Core API Azure C# EF Core F# Fluent Giraffe Interfaces Nintex OAuth Open Xml SharePoint SQLite SQL Server SSIS Suave Visual Studio Code VSTS WCF Word Workflow | nintex oauth, oauth open | visual, october, api, introduction, fluent | 4 |
ivonet.nl | …migrate mkv mocking monitor movie mp3 mp4 mqtt music mysql nas native native bindings netflix nljug nodes npm oauth oow19 open source open-closed osx output payara personal effectiveness photo pi4j picture pmd portainer postgresql… | npm oauth, oauth open | docker, programming, remote, ssh, kubernetes | 2 |
alanta.nl | Signing a request with HMAC is great way to secure your API without the overhead of delegated security like OAuth. | | azure, api, auth, certificate, vault | 2 |
obiee.nl | So now we are almost there on the Google side of things. We just need to generate credentials. Click on Credentials and then click CREATE CREDENTIALS , choosing OAuth Client ID in the dropdown menu: | summary oauth, oauth consent, credentials oauth, oauth client | select, authentication, mapping, oracle, debug | 2 |
barryvdh.nl | OAuth in Javascript Apps with Angular and Lumen, using Satellizer and Laravel Socialite | | founder, file, february, telescope, difference | 2 |
bitpatroon.nl | Seamlessly weave your digital ecosystem with our integration expertise. Bitpatroon excels in harmonizing applications through Single Sign-On, employing diverse protocols like SAML, OAuth, and LTI. Bridging application-to-application… | saml oauth, oauth lti | landscape, api, realm, cohesive, integration | 1 |
hoedinie.nl | Since Hattrick reopened the CHPP program they also changed the login method. Maptrick is one of the first sites adapting to that oAuth authentification. | site oauth, oauth authentification | hall, distribution, federation, conference, graph | 1 |
openonderwijsapi.nl | * To protect personal data such as exam results and timetables, it is advisable to use an authorization server that supports OAuth 2.0 in combination with SURFconext. These security measurements are not included in the OOAPI, but their… | server oauth, oauth combination | api, institute, educational, response, description | 1 |
devoorkant.nl | We know how to apply modern standards like oAuth 2.0, SSL, (Client Side) Certificates and PKI Encryption. From experience, we can choose from a number of solutions and concepts to provide you with the best (federated) authentication and… | like oauth, oauth ssl | integration, solid, mid, banking, enterprise | 1 |
stephantollenaar.nl | After the recode of NowPlaying is completed we hope to remove the inactivity system by splitting users to different OAuth applications and by setting up more servers. | different oauth, oauth application | currently, television, reliability, founder, graphic | 1 |
jeffreyappel.nl | Recently threat actors like Midnight Blizzard use the OAuth applications in tenants that they can misuse for malicious activity. Actors use compromised user accounts to create/ modify and grant permissions to OAuth applications in tenants… | blizzard oauth, oauth application, permission oauth | january, attack, endpoint, xdr, min | 1 |
jorisvergeer.nl | From time to time you have to implement an API that has to have the same endpoint but has to do something differently based on the content of the request. For example take the OAuth2 /token endpoint. (This is an example, in real world use… | | february, file, python, directory, output | 1 |
iriks-it.nl | Whether it's maintaining a WordPress theme, creating a custom WordPress plugin, creating Discord bots in NodeJS modules like DiscordJS, or creating a OAuth 2.0 secured Rest API with flood protections utilizing Redis... I LOVE IT ALL! The… | discordjs oauth, oauth rest | composer, january, fri, github, api | 1 |
freeklijten.nl | Since lots of people at Procurios work in multi-disciplinary teams it is not uncommon to have only one or two direct colleagues that perform exactly the same tasks as yourself. A threat to this approach is knowledge on a certain… | | exception, talk, default, final, reaction | 0 |
devgs.nl | Senior Java Developer to support air traffic controllers with accurate flight plan data in an extremely high available environment. Software development using Java 17, Spring Boot, ActiveMQ and Apache Kafka. | | certification, reference, architecture, slide, teacher | 0 |
dirxml.nl | We hope this information provides you a helping hand when you are involved in any project. | oauth oidc | identity, authentication, saml, ltd, documentation | 0 |
rikjacobs.nl | Portfolio of full-stack .NET software developer Rik Jacobs. Loves React, Microsoft stack and distributed systems. | | stack, react, typescript, azure, warehouse | 0 |
cecilehendriks.nl | Included files… Loaded… | | file, openssl, calendar, curl, hash | 0 |
jan-v.nl | …own Managed Identity. You can choose to use a System Managed Identity or a User Managed Identity. Both options have pros and cons. When you have configured APIM with a managed identity, this identity can be used to authenticate with the… | | azure, api, authentication, identity, query | 0 |
anvera.nl | Tonx cray commodo, exercitation you probably haven’t heard of them beard cred. Selfies iPhone Kickstarter, drinking vinegar jean shorts fixie consequat flexitarian four loko disrupt dreamcatcher beard craft beer stumptown. Paleo 90′s… | | autumn, beard, progress, yr, elit | 0 |
codeasaservice.nl | Our software engineering consultants are experts in different areas of work. They are here for software advice, strategy, specifications and design, enabling you to build better & secure (online) products. | | secure, accessibility, requirements, lifecycle, suitable | 0 |
janpietras.nl | …frontend techonologies, application interface design, usability choices, and their impact on users. However, as a backend specialist, for larger more complex projects I do prefer to work together with other developers specialized in… | | symfony, optimization, analysis, sustainability, background | 0 |
pbcompaan.nl | This blog contains stuff I've figured out and thought was worth mentioning. Feel free to hit me up on the above links! | storing oauth, oauth tokens | automatic, mutual, think, stuff, worth | 0 |
boisen.nl | BOISEN - For the Love of Place provide cities and regions with state-of-the-art advice on place marketing, place management and place branding. | | region, operation, stakeholder, evaluation, advisor | 0 |
benian.nl | EDUCATION… | | react, nodejs, stack, redux, oracle | 0 |
digitaalcv.nl | Machine learning Kafka PostgreSQL NoSQL Image processing Redis memcached RabbitMQ Elastic OpenCV | | python, resume, flask, graphene, frontend | 0 |