Home page » Initial: o » First 2 letters: oa » Keyword: oauth

29 Dutch websites relevant to the keyword: oauth

DomainExcerpts relevant to keyword: oauthRelated expressionsOther expressions from the websiteeRelevance
kauffmann.nlIt’s a recurring question I get quite frequently: how to set up Business Central on-premises for Azure Active Directory authentication? And related to that, how to call APIs on Business Central on-premises with OAuth authentication? I…microsoft oauth, oauth authentication, time oauth, premise oauth, central oauthcentral, api, authentication, dynamic, al25
kilala.nlI'm currently going through PDSO's API security training , preparing for the exam. OAuth gets about twenty minutes of video in there and they do a relatively good job of explaining. But yet again, there's still a lot of details missing.oidc oauth, oauth authorization, dive oauth, oauth technical, oauth opaexam, api, certification, vendor, objective13
devnetnoord.nl…you can enable your autonomous services to also make autonomous authorization decisions. Join me in finding out how OAuth On-Behalf-Of works, and why it's relevant. In this talk, we'll cover why user delegation using On-Behalf-Of helps…access oauth, oauth developer, decision oauth, oauth behalfazure, session, package, github, presentation4
eelcomulder.nl.Net Core API Azure C# EF Core F# Fluent Giraffe Interfaces Nintex OAuth Open Xml SharePoint SQLite SQL Server SSIS Suave Visual Studio Code VSTS WCF Word Workflownintex oauth, oauth openvisual, october, api, introduction, fluent4
ivonet.nl…migrate mkv mocking monitor movie mp3 mp4 mqtt music mysql nas native native bindings netflix nljug nodes npm oauth oow19 open source open-closed osx output payara personal effectiveness photo pi4j picture pmd portainer postgresql…npm oauth, oauth opendocker, programming, remote, ssh, kubernetes2
alanta.nlSigning a request with HMAC is great way to secure your API without the overhead of delegated security like OAuth.azure, api, auth, certificate, vault2
obiee.nlSo now we are almost there on the Google side of things. We just need to generate credentials. Click on Credentials and then click CREATE CREDENTIALS , choosing OAuth Client ID in the dropdown menu:summary oauth, oauth consent, credentials oauth, oauth clientselect, authentication, mapping, oracle, debug2
barryvdh.nlOAuth in Javascript Apps with Angular and Lumen, using Satellizer and Laravel Socialitefounder, file, february, telescope, difference2
bitpatroon.nlSeamlessly weave your digital ecosystem with our integration expertise. Bitpatroon excels in harmonizing applications through Single Sign-On, employing diverse protocols like SAML, OAuth, and LTI. Bridging application-to-application…saml oauth, oauth ltilandscape, api, realm, cohesive, integration1
hoedinie.nlSince Hattrick reopened the CHPP program they also changed the login method. Maptrick is one of the first sites adapting to that oAuth authentification.site oauth, oauth authentificationhall, distribution, federation, conference, graph1
openonderwijsapi.nl* To protect personal data such as exam results and timetables, it is advisable to use an authorization server that supports OAuth 2.0 in combination with SURFconext. These security measurements are not included in the OOAPI, but their…server oauth, oauth combinationapi, institute, educational, response, description1
devoorkant.nlWe know how to apply modern standards like oAuth 2.0, SSL, (Client Side) Certificates and PKI Encryption. From experience, we can choose from a number of solutions and concepts to provide you with the best (federated) authentication and…like oauth, oauth sslintegration, solid, mid, banking, enterprise1
stephantollenaar.nlAfter the recode of NowPlaying is completed we hope to remove the inactivity system by splitting users to different OAuth applications and by setting up more servers.different oauth, oauth applicationcurrently, television, reliability, founder, graphic1
jeffreyappel.nlRecently threat actors like Midnight Blizzard use the OAuth applications in tenants that they can misuse for malicious activity. Actors use compromised user accounts to create/ modify and grant permissions to OAuth applications in tenants…blizzard oauth, oauth application, permission oauthjanuary, attack, endpoint, xdr, min1
jorisvergeer.nlFrom time to time you have to implement an API that has to have the same endpoint but has to do something differently based on the content of the request. For example take the OAuth2 /token endpoint. (This is an example, in real world use…february, file, python, directory, output1
iriks-it.nlWhether it's maintaining a WordPress theme, creating a custom WordPress plugin, creating Discord bots in NodeJS modules like DiscordJS, or creating a OAuth 2.0 secured Rest API with flood protections utilizing Redis... I LOVE IT ALL! The…discordjs oauth, oauth restcomposer, january, fri, github, api1
freeklijten.nlSince lots of people at Procurios work in multi-disciplinary teams it is not uncommon to have only one or two direct colleagues that perform exactly the same tasks as yourself. A threat to this approach is knowledge on a certain…exception, talk, default, final, reaction0
devgs.nlSenior Java Developer to support air traffic controllers with accurate flight plan data in an extremely high available environment. Software development using Java 17, Spring Boot, ActiveMQ and Apache Kafka.certification, reference, architecture, slide, teacher0
dirxml.nlWe hope this information provides you a helping hand when you are involved in any project.oauth oidcidentity, authentication, saml, ltd, documentation0
rikjacobs.nlPortfolio of full-stack .NET software developer Rik Jacobs. Loves React, Microsoft stack and distributed systems.stack, react, typescript, azure, warehouse0
cecilehendriks.nlIncluded files… Loaded…file, openssl, calendar, curl, hash0
jan-v.nl…own Managed Identity. You can choose to use a System Managed Identity or a User Managed Identity. Both options have pros and cons. When you have configured APIM with a managed identity, this identity can be used to authenticate with the…azure, api, authentication, identity, query0
anvera.nlTonx cray commodo, exercitation you probably haven’t heard of them beard cred. Selfies iPhone Kickstarter, drinking vinegar jean shorts fixie consequat flexitarian four loko disrupt dreamcatcher beard craft beer stumptown. Paleo 90′s…autumn, beard, progress, yr, elit0
codeasaservice.nlOur software engineering consultants are experts in different areas of work. They are here for software advice, strategy, specifications and design, enabling you to build better & secure (online) products.secure, accessibility, requirements, lifecycle, suitable0
janpietras.nl…frontend techonologies, application interface design, usability choices, and their impact on users. However, as a backend specialist, for larger more complex projects I do prefer to work together with other developers specialized in…symfony, optimization, analysis, sustainability, background0
pbcompaan.nlThis blog contains stuff I've figured out and thought was worth mentioning. Feel free to hit me up on the above links!storing oauth, oauth tokensautomatic, mutual, think, stuff, worth0
boisen.nlBOISEN - For the Love of Place provide cities and regions with state-of-the-art advice on place marketing, place management and place branding.region, operation, stakeholder, evaluation, advisor0
benian.nlEDUCATION…react, nodejs, stack, redux, oracle0
digitaalcv.nlMachine learning Kafka PostgreSQL NoSQL Image processing Redis memcached RabbitMQ Elastic OpenCVpython, resume, flask, graphene, frontend0