Skip to content

RCBJ Blog

Integration, Middleware, Identity, and APIs

  • Contact Information
  • Privacy Policy
  • Quick Reference
    • Computer Measurements
  • RCBJ.NET – About Us
  • rcbj.net Conventions
  • Relevant Links

Author: rcbj-admin

Identity Protocols, Hosted Login UIs, and Custom Login UIs

July 13, 2020 rcbj-admin Uncategorized

There are many ways to implement user authentication in a modern application (mobile, desktop, tablet, web, etc). I have previously[…]

Read more

Application Security Models

November 5, 2017 rcbj-admin Uncategorized

I like to start system design (at the application level) with the security model that will be used to protect[…]

Read more

Digital Signature Series

November 5, 2017 rcbj-admin Uncategorized

The following blog posts are part of a series I wrote on digital signatures. DSig Part 1: XML Digital Signature[…]

Read more

Performance Tuning Methodology

November 5, 2017 rcbj-admin Uncategorized

I’m taking a brief excursion from my usual identity and API-centric posts to answer a question about performance tuning someone[…]

Read more

Understanding WS-Federation — Passive Requestor Profile

October 19, 2017 rcbj-admin Uncategorized

There are several identity protocols that are commonly supported by Identity Providers today — OAuth2, OAuth2 Token Exchange, OIDC, SAML2 Browser Profile,[…]

Read more

Summary of Azure Active Directory OAuth2 Authorization Grant and OIDC Authentication Flow Uses

September 30, 2017 rcbj-admin Uncategorized

A while back I needed a summary of which protocols were supported/recommended in different situations by Azure Active Directory while[…]

Read more

Authentication vs. Federation vs. SSO

September 30, 2017 rcbj-admin Uncategorized

Authentication. Federation. Single Sign On (SSO). I’ve mentioned these concepts many times. I haven’t actually formally defined what each of[…]

Read more

How To Submit Your Security Tokens to an API Provider, Pt. 2

September 17, 2017 rcbj-admin Uncategorized

This post was originally published as “How to Submit Tokens to an API Provider, Pt 2” on the Apigee Blog.[…]

Read more

How To Submit Your Security Tokens to an API Provider Pt. 1

September 17, 2017 rcbj-admin Uncategorized

This post was originally published as “How to Submit Tokens to an API Provider, Pt 1” on the Apigee Blog.[…]

Read more

SAML2 vs JWT: A Comparison

July 20, 2017 rcbj-admin Uncategorized

This post concludes our discussion of SAML2 and JWT. Here we look at a comparison of the features and use[…]

Read more

Posts navigation

1 2 3 … 6 Next Posts»

Recent Posts

  • Identity Protocols, Hosted Login UIs, and Custom Login UIs
  • Differences Between Azure Active Directory and Red Hat SSO v7.1
  • OAuth2 Resource Owner Password Credential Grant with 3Scale and Red Hat SSO
  • OAuth2 Implicit Grant with 3Scale and Red Hat SSO
  • OAuth2 Configuration in 3Scale API Management (and APICast) with Red Hat SSO

Recent Comments

    Archives

    • July 2020
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • October 2016
    • August 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • December 2012
    • November 2012
    • October 2012
    • September 2012
    • July 2012
    • June 2012
    • May 2012
    • April 2012
    • March 2012
    • February 2012
    • January 2012
    • December 2011
    • October 2011
    • June 2011
    • April 2011
    • September 2010
    • July 2010
    • October 2009
    • August 2009
    • June 2009
    • May 2009
    • April 2009
    • February 2009
    • January 2009
    • December 2008
    • November 2008
    • October 2008
    • September 2008
    • August 2008
    • March 2008
    • December 2007
    • October 2007
    • February 2007
    • January 2007
    • November 2006
    • September 2006
    • August 2006

    Categories

    • architecture
    • Browser
    • cryptography
    • datapower
    • development
    • diagnostics
    • ha
    • IBM JDK
    • internet
    • J2EE
    • java
    • JBoss
    • JBoss World
    • JEE
    • jvm
    • JVM Internals
    • ldap
    • networking
    • Performance
    • Recommended Reading
    • Security
    • Servlet
    • Servlet
    • soa
    • soa appliance
    • SOAP
    • Speaking
    • Sun JDK
    • Uncategorized
    • VPN
    • web
    • web service
    • Weblogic
    • websphere
    • xml
    • xpath
    • xslt

    Meta

    • Log in
    • Entries RSS
    • Comments RSS
    • WordPress.org

    About Us

    Contact Information

    This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settings ACCEPT
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
    Necessary
    Always Enabled

    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

    Non Necessary

    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

    Advertisement

    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

    Analytics

    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

    Performance

    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

    Save & Accept