Tech explanations for dummies by a dummy.

How does CIAM differ from IAM?

Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important to build a potent CIAM strategy. This article tries to explore these key differences in detail. To begin with, CIAM… Continue Reading →

The Authorization Code Redirect URI Manipulation attack in OAuth 2.0

Changing the authorization code redirect URI is one of the ways by which attackers try to game the OAuth 2.0 authorization framework. This article discusses how this attack works in detail and how this attack can be prevented. If you… Continue Reading →

Getting started with User Managed Access (UMA)

User Managed Access is an OAuth-based access management protocol that allows owners of resources to passively authorize access to their resources by third parties. To understand how User Managed Access works, it is paramount that you understand how OAuth 2.0… Continue Reading →

Understanding OpenID Connect (OIDC)

OpenID Connect is an authentication protocol built on top of OAuth 2.0 to facilitate identity provision and Single Sign-On.

What is OAuth 2.0? How does it work?

A primer on OAuth 2.0 for dummies by a dummy.

© 2019 The Armchair Critic — Powered by WordPress

Theme by Anders NorenUp ↑