IAM

Securely receiving authorization code in SPAs using form_post

If you have used the OIDC protocol to implement single sign-on, you would be used to receiving the authorization code…

3 years ago

Configuring Azure Active Directory as a federated IdP in WSO2 Identity Server using SAML

WSO2 Identity Server allows you to integrate Azure Active Directory as a federated identity provider out of the box using…

3 years ago

CIAM and common misconceptions

The C in CIAM stands for the customer; this means that a business that wants to attract and retain customers…

4 years ago

How does TOTP authentication work?

Unless you have been living under a rock, you would be very used to authenticating yourself using an authenticator app…

4 years ago

How does HOTP authentication work?

Before smartphones were popular, hardware tokens that produced an HOTP code were a popular way of performing two-factor authentications. Businesses…

4 years ago

What is HMAC and how does it work?

HMAC stands for Hash-based Message Authentication Code or Keyed-hash Message Authentication Code. We use it to verify the authenticity and…

4 years ago

How does CIAM differ from IAM?

Even though CIAM and IAM are technologically similar, they both serve two different purposes. Understanding these differences is very important…

4 years ago

What is OAuth 2.0? How does it work?

A primer on OAuth 2.0 for dummies by a dummy.…Read More

5 years ago